ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 146

Question list
Search
Search

List of questions

Search

Which of the (ISC)? Code of Ethics canons is MOST reflected when preserving the value of systems, applications, and entrusted information while avoiding conflicts of interest?

A.
Act honorably, honestly, justly, responsibly, and legally.
A.
Act honorably, honestly, justly, responsibly, and legally.
Answers
B.
Protect society, the commonwealth, and the infrastructure.
B.
Protect society, the commonwealth, and the infrastructure.
Answers
C.
Provide diligent and competent service to principles.
C.
Provide diligent and competent service to principles.
Answers
D.
Advance and protect the profession.
D.
Advance and protect the profession.
Answers
Suggested answer: B

he security organization is loading for a solution that could help them determine with a strong level of confident that attackers have breached their network. Which solution is MOST effective at discovering successful network breach?

A.
Installing an intrusion prevention system (IPS)
A.
Installing an intrusion prevention system (IPS)
Answers
B.
Deploying a honeypot
B.
Deploying a honeypot
Answers
C.
Installing an intrusion detection system (IDS)
C.
Installing an intrusion detection system (IDS)
Answers
D.
Developing a sandbox
D.
Developing a sandbox
Answers
Suggested answer: B

Which of the following techniques evaluates the secure design principles of network OF software architectures?

A.
Risk modeling
A.
Risk modeling
Answers
B.
Threat modeling
B.
Threat modeling
Answers
C.
Fuzzing
C.
Fuzzing
Answers
D.
Waterfall method
D.
Waterfall method
Answers
Suggested answer: B

When designing a business continuity plan (BCP), what is the formula to determine the Maximum Tolerable Downtime (MTD)?

A.
Annual Loss Expectancy (ALE) + Work Recovery Time (WRT)
A.
Annual Loss Expectancy (ALE) + Work Recovery Time (WRT)
Answers
B.
Business impact analysis (BIA) + Recovery Point Objective (RPO)
B.
Business impact analysis (BIA) + Recovery Point Objective (RPO)
Answers
C.
Recovery Time Objective (RTO) + Work Recovery Time (WRT)
C.
Recovery Time Objective (RTO) + Work Recovery Time (WRT)
Answers
D.
Estimated Maximum Loss (EML) + Recovery Time Objective (RTO)
D.
Estimated Maximum Loss (EML) + Recovery Time Objective (RTO)
Answers
Suggested answer: C

A company wants to implement two-factor authentication (2FA) to protect their computers from unauthorized users. Which solution provides the MOST secure means of authentication and meets the criteria they have set?

A.
Username and personal identification number (PIN)
A.
Username and personal identification number (PIN)
Answers
B.
Fingerprint and retinal scanners
B.
Fingerprint and retinal scanners
Answers
C.
Short Message Services (SMS) and smartphone authenticator
C.
Short Message Services (SMS) and smartphone authenticator
Answers
D.
Hardware token and password
D.
Hardware token and password
Answers
Suggested answer: D

Which of the following is the MOST important first step in preparing for a security audit?

A.
Identify team members.
A.
Identify team members.
Answers
B.
Define the scope.
B.
Define the scope.
Answers
C.
Notify system administrators.
C.
Notify system administrators.
Answers
D.
Collect evidence.
D.
Collect evidence.
Answers
Suggested answer: B

An attacker is able to remain indefinitely logged into a exploiting to remain on the web service?

A.
Alert management
A.
Alert management
Answers
B.
Password management
B.
Password management
Answers
C.
Session management
C.
Session management
Answers
D.
Identity management (IM)
D.
Identity management (IM)
Answers
Suggested answer: C

Which of the following attack types can be used to compromise the integrity of data during transmission?

A.
Keylogging
A.
Keylogging
Answers
B.
Packet sniffing
B.
Packet sniffing
Answers
C.
Synchronization flooding
C.
Synchronization flooding
Answers
D.
Session hijacking
D.
Session hijacking
Answers
Suggested answer: B

A recent information security risk assessment identified weak system access controls on mobile devices as a high me In order to address this risk and ensure only authorized staff access company information, which of the following should the organization implement?

A.
Intrusion prevention system (IPS)
A.
Intrusion prevention system (IPS)
Answers
B.
Multi-factor authentication (MFA)
B.
Multi-factor authentication (MFA)
Answers
C.
Data loss protection (DLP)
C.
Data loss protection (DLP)
Answers
D.
Data at rest encryption
D.
Data at rest encryption
Answers
Suggested answer: B

Which of the following addresses requirements of security assessment during software acquisition?

A.
Software assurance policy
A.
Software assurance policy
Answers
B.
Continuous monitoring
B.
Continuous monitoring
Answers
C.
Software configuration management (SCM)
C.
Software configuration management (SCM)
Answers
D.
Data loss prevention (DLP) policy
D.
Data loss prevention (DLP) policy
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149