ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 148

Question list
Search
Search

What are the first two components of logical access control?

A.
Confidentiality and authentication
A.
Confidentiality and authentication
Answers
B.
Authentication and identification
B.
Authentication and identification
Answers
C.
Identification and confidentiality
C.
Identification and confidentiality
Answers
D.
Authentication and availability
D.
Authentication and availability
Answers
Suggested answer: B

What is the MAIN purpose of a security assessment plan?

A.
Provide guidance on security requirements, to ensure the identified security risks are properly addressed based on the recommendation
A.
Provide guidance on security requirements, to ensure the identified security risks are properly addressed based on the recommendation
Answers
B.
Provide the objectives for the security and privacy control assessments and a detailed roadmap of how to conduct such assessments.
B.
Provide the objectives for the security and privacy control assessments and a detailed roadmap of how to conduct such assessments.
Answers
C.
Provide technical information to executives to help them understand information security postures and secure funding.
C.
Provide technical information to executives to help them understand information security postures and secure funding.
Answers
D.
Provide education to employees on security and privacy, to ensure their awareness on policies and procedures
D.
Provide education to employees on security and privacy, to ensure their awareness on policies and procedures
Answers
Suggested answer: B

What is the MAIN purpose of conducting a business impact analysis (BIA)?

A.
To determine the critical resources required to recover from an incident within a specified time period
A.
To determine the critical resources required to recover from an incident within a specified time period
Answers
B.
To determine the effect of mission-critical information system failures on core business processes
B.
To determine the effect of mission-critical information system failures on core business processes
Answers
C.
To determine the cost for restoration of damaged information system
C.
To determine the cost for restoration of damaged information system
Answers
D.
To determine the controls required to return to business critical operations
D.
To determine the controls required to return to business critical operations
Answers
Suggested answer: B

Which of the following is the FIRST requirement a data owner should consider before implementing a data retention policy?

A.
Training
A.
Training
Answers
B.
Legal
B.
Legal
Answers
C.
Business
C.
Business
Answers
D.
Storage
D.
Storage
Answers
Suggested answer: B

Information Security Continuous Monitoring (1SCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. Which of the following is the FIRST step in developing an ISCM strategy and implementing an ISCM program?

A.
Define a strategy based on risk tolerance that maintains clear visibility into assets, awareness of vulnerabilities, up-to-date threat information, and mission/business impacts.
A.
Define a strategy based on risk tolerance that maintains clear visibility into assets, awareness of vulnerabilities, up-to-date threat information, and mission/business impacts.
Answers
B.
Conduct a vulnerability assessment to discover current threats against the environment and incorporate them into the program.
B.
Conduct a vulnerability assessment to discover current threats against the environment and incorporate them into the program.
Answers
C.
Respond to findings with technical management, and operational mitigating activities or acceptance, transference/sharing, or avoidance/rejection.
C.
Respond to findings with technical management, and operational mitigating activities or acceptance, transference/sharing, or avoidance/rejection.
Answers
D.
Analyze the data collected and report findings, determining the appropriate response. It may be necessary to collect additional information to clarify or supplement existing monitoring data.
D.
Analyze the data collected and report findings, determining the appropriate response. It may be necessary to collect additional information to clarify or supplement existing monitoring data.
Answers
Suggested answer: A

When designing a Cyber-Physical System (CPS), which of the following should be a security practitioner's first consideration?

A.
Resiliency of the system
A.
Resiliency of the system
Answers
B.
Detection of sophisticated attackers
B.
Detection of sophisticated attackers
Answers
C.
Risk assessment of the system
C.
Risk assessment of the system
Answers
D.
Topology of the network used for the system
D.
Topology of the network used for the system
Answers
Suggested answer: A

Which of the following BEST describes the use of network architecture in reducing corporate risks associated with mobile devices?

A.
Maintaining a "closed applications model on all mobile devices depends on demilitarized 2one (DM2) servers
A.
Maintaining a "closed applications model on all mobile devices depends on demilitarized 2one (DM2) servers
Answers
B.
Split tunneling enabled for mobile devices improves demilitarized zone (DMZ) security posture
B.
Split tunneling enabled for mobile devices improves demilitarized zone (DMZ) security posture
Answers
C.
Segmentation and demilitarized zone (DMZ) monitoring are implemented to secure a virtual private network (VPN) access for mobile devices
C.
Segmentation and demilitarized zone (DMZ) monitoring are implemented to secure a virtual private network (VPN) access for mobile devices
Answers
D.
Applications that manage mobile devices are located in an Internet demilitarized zone (DMZ)
D.
Applications that manage mobile devices are located in an Internet demilitarized zone (DMZ)
Answers
Suggested answer: C

Which of the following is an important design feature for the outer door o f a mantrap?

A.
Allow it to be opened by an alarmed emergency button.
A.
Allow it to be opened by an alarmed emergency button.
Answers
B.
Do not allow anyone to enter it alone.
B.
Do not allow anyone to enter it alone.
Answers
C.
Do not allow it to be observed by dosed-circuit television (CCTV) cameras.
C.
Do not allow it to be observed by dosed-circuit television (CCTV) cameras.
Answers
D.
Allow it be opened when the inner door of the mantrap is also open
D.
Allow it be opened when the inner door of the mantrap is also open
Answers
Suggested answer: D

In setting expectations when reviewing the results of a security test, which of the following statements is MOST important to convey to reviewers?

A.
The target's security posture cannot be further compromised.
A.
The target's security posture cannot be further compromised.
Answers
B.
The results of the tests represent a point-in-time assessment of the target(s).
B.
The results of the tests represent a point-in-time assessment of the target(s).
Answers
C.
The accuracy of testing results can be greatly improved if the target(s) are properly hardened.
C.
The accuracy of testing results can be greatly improved if the target(s) are properly hardened.
Answers
D.
The deficiencies identified can be corrected immediately
D.
The deficiencies identified can be corrected immediately
Answers
Suggested answer: C

What is the overall goal of software security testing?

A.
Identifying the key security features of the software
A.
Identifying the key security features of the software
Answers
B.
Ensuring all software functions perform as specified
B.
Ensuring all software functions perform as specified
Answers
C.
Reducing vulnerabilities within a software system
C.
Reducing vulnerabilities within a software system
Answers
D.
Making software development more agile
D.
Making software development more agile
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149