ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 16

List of questions

Question 151

Report Export Collapse

The goal of software assurance in application development is to

enable the development of High Availability (HA) systems.
enable the development of High Availability (HA) systems.
facilitate the creation of Trusted Computing Base (TCB) systems.
facilitate the creation of Trusted Computing Base (TCB) systems.
prevent the creation of vulnerable applications.
prevent the creation of vulnerable applications.
encourage the development of open source applications.
encourage the development of open source applications.
Suggested answer: C
asked 18/09/2024
LEONARDO CESAR MARQUES
49 questions

Question 152

Report Export Collapse

What is the ultimate objective of information classification?

To assign responsibility for mitigating the risk to vulnerable systems
To assign responsibility for mitigating the risk to vulnerable systems
To ensure that information assets receive an appropriate level of protection
To ensure that information assets receive an appropriate level of protection
To recognize that the value of any item of information may change over time
To recognize that the value of any item of information may change over time
To recognize the optimal number of classification categories and the benefits to be gained from their use
To recognize the optimal number of classification categories and the benefits to be gained from their use
Suggested answer: B
asked 18/09/2024
louishn vn
29 questions

Question 153

Report Export Collapse

In a financial institution, who has the responsibility for assigning the classification to a piece of information?

Chief Financial Officer (CFO)
Chief Financial Officer (CFO)
Chief Information Security Officer (CISO)
Chief Information Security Officer (CISO)
Originator or nominated owner of the information
Originator or nominated owner of the information
Department head responsible for ensuring the protection of the information
Department head responsible for ensuring the protection of the information
Suggested answer: C
asked 18/09/2024
Geert De Ridder
37 questions

Question 154

Report Export Collapse

An organization is designing a large enterprise-wide document repository system. They plan to have several different classification level areas with increasing levels of controls. The BEST way to ensure document confidentiality in the repository is to

encrypt the contents of the repository and document any exceptions to that requirement.
encrypt the contents of the repository and document any exceptions to that requirement.
utilize Intrusion Detection System (IDS) set drop connections if too many requests for documents are detected.
utilize Intrusion Detection System (IDS) set drop connections if too many requests for documents are detected.
keep individuals with access to high security areas from saving those documents into lower security areas.
keep individuals with access to high security areas from saving those documents into lower security areas.
require individuals with access to the system to sign Non-Disclosure Agreements (NDA).
require individuals with access to the system to sign Non-Disclosure Agreements (NDA).
Suggested answer: A
asked 18/09/2024
Edgar Santiago
49 questions

Question 155

Report Export Collapse

What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?

Signature
Signature
Inference
Inference
Induction
Induction
Heuristic
Heuristic
Suggested answer: D
asked 18/09/2024
Volkan Ozsoy
39 questions

Question 156

Report Export Collapse

Contingency plan exercises are intended to do which of the following?

Train personnel in roles and responsibilities
Train personnel in roles and responsibilities
Validate service level agreements
Validate service level agreements
Train maintenance personnel
Train maintenance personnel
Validate operation metrics
Validate operation metrics
Suggested answer: A
asked 18/09/2024
samer salami
39 questions

Question 157

Report Export Collapse

Two companies wish to share electronic inventory and purchase orders in a supplier and client relationship. What is the BEST security solution for them?

Write a Service Level Agreement (SLA) for the two companies.
Write a Service Level Agreement (SLA) for the two companies.
Set up a Virtual Private Network (VPN) between the two companies.
Set up a Virtual Private Network (VPN) between the two companies.
Configure a firewall at the perimeter of each of the two companies.
Configure a firewall at the perimeter of each of the two companies.
Establish a File Transfer Protocol (FTP) connection between the two companies.
Establish a File Transfer Protocol (FTP) connection between the two companies.
Suggested answer: B
asked 18/09/2024
Markus Hechtl
39 questions

Question 158

Report Export Collapse

Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to what?

Interface with the Public Key Infrastructure (PKI)
Interface with the Public Key Infrastructure (PKI)
Improve the quality of security software
Improve the quality of security software
Prevent Denial of Service (DoS) attacks
Prevent Denial of Service (DoS) attacks
Establish a secure initial state
Establish a secure initial state
Suggested answer: D
asked 18/09/2024
david buisan garcia
37 questions

Question 159

Report Export Collapse

What a patch management program?

Perform automatic deployment of patches.
Perform automatic deployment of patches.
Monitor for vulnerabilities and threats.
Monitor for vulnerabilities and threats.
Prioritize vulnerability remediation.
Prioritize vulnerability remediation.
Create a system inventory.
Create a system inventory.
Suggested answer: D
asked 18/09/2024
David Vicente Martinez
36 questions

Question 160

Report Export Collapse

Which of the following is an open standard for exchanging authentication and authorization data between parties?

Wired markup language
Wired markup language
Hypertext Markup Language (HTML)
Hypertext Markup Language (HTML)
Extensible Markup Language (XML)
Extensible Markup Language (XML)
Security Assertion Markup Language (SAML)
Security Assertion Markup Language (SAML)
Suggested answer: D
asked 18/09/2024
ASDASDASDA SDASD
41 questions
Total 1.482 questions
Go to page: of 149