ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 147

Question list
Search
Search

Which of the following MUST the administrator of a security information and event management (SIEM) system ensure?

A.
All sources are reporting in the exact same Extensible Markup Language (XML) format.
A.
All sources are reporting in the exact same Extensible Markup Language (XML) format.
Answers
B.
Data sources do not contain information infringing upon privacy regulations.
B.
Data sources do not contain information infringing upon privacy regulations.
Answers
C.
All sources are synchronized with a common time reference.
C.
All sources are synchronized with a common time reference.
Answers
D.
Each source uses the same Internet Protocol (IP) address for reporting.
D.
Each source uses the same Internet Protocol (IP) address for reporting.
Answers
Suggested answer: C

Which of the following terms BEST describes a system which allows a user to log in and access multiple related servers and applications?

A.
Remote Desktop Protocol (RDP)
A.
Remote Desktop Protocol (RDP)
Answers
B.
Federated identity management (FIM)
B.
Federated identity management (FIM)
Answers
C.
Single sign-on (SSO)
C.
Single sign-on (SSO)
Answers
D.
Multi-factor authentication (MFA)
D.
Multi-factor authentication (MFA)
Answers
Suggested answer: B

After the INITIAL input o f a user identification (ID) and password, what is an authentication system that prompts the user for a different response each time the user logs on?

A.
Persons Identification Number (PIN)
A.
Persons Identification Number (PIN)
Answers
B.
Secondary password
B.
Secondary password
Answers
C.
Challenge response
C.
Challenge response
Answers
D.
Voice authentication
D.
Voice authentication
Answers
Suggested answer: C

What is the P R IM A R Y reason criminal law is difficult to enforce when dealing with cyber-crime?

A.
Extradition treaties are rarely enforced.
A.
Extradition treaties are rarely enforced.
Answers
B.
Numerous language barriers exist.
B.
Numerous language barriers exist.
Answers
C.
Law enforcement agencies are understaffed.
C.
Law enforcement agencies are understaffed.
Answers
D.
Jurisdiction is hard to define.
D.
Jurisdiction is hard to define.
Answers
Suggested answer: D

Which of the following are the B EST characteristics of security metrics?

A.
They are generalized and provide a broad overview
A.
They are generalized and provide a broad overview
Answers
B.
They use acronyms and abbreviations to be concise
B.
They use acronyms and abbreviations to be concise
Answers
C.
They use bar charts and Venn diagrams
C.
They use bar charts and Venn diagrams
Answers
D.
They are consistently measured and quantitatively expressed
D.
They are consistently measured and quantitatively expressed
Answers
Suggested answer: D

At which phase of the software assurance life cycle should risks associated with software acquisition strategies be identified?

A.
Follow-on phase
A.
Follow-on phase
Answers
B.
Planning phase
B.
Planning phase
Answers
C.
Monitoring and acceptance phase
C.
Monitoring and acceptance phase
Answers
D.
Contracting phase
D.
Contracting phase
Answers
Suggested answer: C

Which of the following would be considered an incident if reported by a security information and event management (SIEM) system?

A.
An administrator is logging in on a server through a virtual private network (VPN).
A.
An administrator is logging in on a server through a virtual private network (VPN).
Answers
B.
A log source has stopped sending data.
B.
A log source has stopped sending data.
Answers
C.
A web resource has reported a 404 error.
C.
A web resource has reported a 404 error.
Answers
D.
A firewall logs a connection between a client on the Internet and a web server using Transmission Control Protocol (TCP) on port 80.
D.
A firewall logs a connection between a client on the Internet and a web server using Transmission Control Protocol (TCP) on port 80.
Answers
Suggested answer: C

a large organization uses biometrics to allow access to its facilities. It adjusts the biometric value for incorrectly granting or denying access so that the two numbers are the same.

What is this value called?

A.
False Rejection Rate (FRR)
A.
False Rejection Rate (FRR)
Answers
B.
Accuracy acceptance threshold
B.
Accuracy acceptance threshold
Answers
C.
Equal error rate
C.
Equal error rate
Answers
D.
False Acceptance Rate (FAR)
D.
False Acceptance Rate (FAR)
Answers
Suggested answer: C

Spyware is BEST described as

A.
data mining for advertising.
A.
data mining for advertising.
Answers
B.
a form of cyber-terrorism,
B.
a form of cyber-terrorism,
Answers
C.
an information gathering technique,
C.
an information gathering technique,
Answers
D.
a web-based attack.
D.
a web-based attack.
Answers
Suggested answer: B

If traveling abroad and a customs official demands to examine a personal computer, which of the following should be assumed?

A.
The hard drive has been stolen.
A.
The hard drive has been stolen.
Answers
B.
The Internet Protocol (IP) address has been copied.
B.
The Internet Protocol (IP) address has been copied.
Answers
C.
The hard drive has been copied.
C.
The hard drive has been copied.
Answers
D.
The Media Access Control (MAC) address was stolen
D.
The Media Access Control (MAC) address was stolen
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149