ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 15

List of questions

Question 141

Report Export Collapse

Passive Infrared Sensors (PIR) used in a non-climate controlled environment should

reduce the detected object temperature in relation to the background temperature.
reduce the detected object temperature in relation to the background temperature.
increase the detected object temperature in relation to the background temperature.
increase the detected object temperature in relation to the background temperature.
automatically compensate for variance in background temperature.
automatically compensate for variance in background temperature.
detect objects of a specific temperature independent of the background temperature.
detect objects of a specific temperature independent of the background temperature.
Suggested answer: C
asked 18/09/2024
Francesco Balducci
40 questions

Question 142

Report Export Collapse

The use of strong authentication, the encryption of Personally Identifiable Information (PII) on database servers, application security reviews, and the encryption of data transmitted across networks provide

data integrity.
data integrity.
defense in depth.
defense in depth.
data availability.
data availability.
non-repudiation.
non-repudiation.
Suggested answer: B
asked 18/09/2024
Carola Lotito
49 questions

Question 143

Report Export Collapse

An organization is selecting a service provider to assist in the consolidation of multiple computing sites including development, implementation and ongoing support of various computer systems.

Which of the following MUST be verified by the Information Security Department?

The service provider's policies are consistent with ISO/IEC27001 and there is evidence that the service provider is following those policies.
The service provider's policies are consistent with ISO/IEC27001 and there is evidence that the service provider is following those policies.
The service provider will segregate the data within its systems and ensure that each region's policies are met.
The service provider will segregate the data within its systems and ensure that each region's policies are met.
The service provider will impose controls and protections that meet or exceed the current systems controls and produce audit logs as verification.
The service provider will impose controls and protections that meet or exceed the current systems controls and produce audit logs as verification.
The service provider's policies can meet the requirements imposed by the new environment even if they differ from the organization's current policies.
The service provider's policies can meet the requirements imposed by the new environment even if they differ from the organization's current policies.
Suggested answer: D
asked 18/09/2024
Hassan Shafi
33 questions

Question 144

Report Export Collapse

Which of the following is an appropriate source for test data?

Production data that is secured and maintained only in the production environment.
Production data that is secured and maintained only in the production environment.
Test data that has no similarities to production datA.
Test data that has no similarities to production datA.
Test data that is mirrored and kept up-to-date with production datA.
Test data that is mirrored and kept up-to-date with production datA.
Production data that has been sanitized before loading into a test environment.
Production data that has been sanitized before loading into a test environment.
Suggested answer: D
asked 18/09/2024
Srinivasan Krishnamoorthy
43 questions

Question 145

Report Export Collapse

What is the FIRST step in developing a security test and its evaluation?

Determine testing methods
Determine testing methods
Develop testing procedures
Develop testing procedures
Identify all applicable security requirements
Identify all applicable security requirements
Identify people, processes, and products not in compliance
Identify people, processes, and products not in compliance
Suggested answer: C
asked 18/09/2024
Mikael Klingebrant
35 questions

Question 146

Report Export Collapse

How can a forensic specialist exclude from examination a large percentage of operating system files residing on a copy of the target system?

Take another backup of the media in question then delete all irrelevant operating system files.
Take another backup of the media in question then delete all irrelevant operating system files.
Create a comparison database of cryptographic hashes of the files from a system with the same operating system and patch level.
Create a comparison database of cryptographic hashes of the files from a system with the same operating system and patch level.
Generate a message digest (MD) or secure hash on the drive image to detect tampering of the media being examined.
Generate a message digest (MD) or secure hash on the drive image to detect tampering of the media being examined.
Discard harmless files for the operating system, and known installed programs.
Discard harmless files for the operating system, and known installed programs.
Suggested answer: B
asked 18/09/2024
Bruno Soriano
37 questions

Question 147

Report Export Collapse

Which one of the following is a threat related to the use of web-based client side input validation?

Users would be able to alter the input after validation has occurred
Users would be able to alter the input after validation has occurred
The web server would not be able to validate the input after transmission
The web server would not be able to validate the input after transmission
The client system could receive invalid input from the web server
The client system could receive invalid input from the web server
The web server would not be able to receive invalid input from the client
The web server would not be able to receive invalid input from the client
Suggested answer: A
asked 18/09/2024
Istvan Molnar
35 questions

Question 148

Report Export Collapse

To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media being discarded?

Multiple-pass overwriting
Multiple-pass overwriting
Degaussing
Degaussing
High-level formatting
High-level formatting
Physical destruction
Physical destruction
Suggested answer: C
asked 18/09/2024
Steve Marechal
41 questions

Question 149

Report Export Collapse

Multi-threaded applications are more at risk than single-threaded applications to

race conditions.
race conditions.
virus infection.
virus infection.
packet sniffing.
packet sniffing.
database injection.
database injection.
Suggested answer: A
asked 18/09/2024
Joza Pakledinac
35 questions

Question 150

Report Export Collapse

Which of the following is a potential risk when a program runs in privileged mode?

It may serve to create unnecessary code complexity
It may serve to create unnecessary code complexity
It may not enforce job separation duties
It may not enforce job separation duties
It may create unnecessary application hardening
It may create unnecessary application hardening
It may allow malicious code to be inserted
It may allow malicious code to be inserted
Suggested answer: D
asked 18/09/2024
yassine harbeg
40 questions
Total 1.482 questions
Go to page: of 149