ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 17

Question list
Search
Search

Question 161

Report
Export
Collapse

When designing a networked Information System (IS) where there will be several different types of individual access, what is the FIRST step that should be taken to ensure all access control requirements are addressed?

A.
Create a user profile.
A.
Create a user profile.
Answers
B.
Create a user access matrix.
B.
Create a user access matrix.
Answers
C.
Develop an Access Control List (ACL).
C.
Develop an Access Control List (ACL).
Answers
D.
Develop a Role Based Access Control (RBAC) list.
D.
Develop a Role Based Access Control (RBAC) list.
Answers
Suggested answer: B
asked 18/09/2024
Robert Andrade
47 questions

Question 162

Report
Export
Collapse

Which of the following is the BEST way to verify the integrity of a software patch?

A.
Cryptographic checksums
A.
Cryptographic checksums
Answers
B.
Version numbering
B.
Version numbering
Answers
C.
Automatic updates
C.
Automatic updates
Answers
D.
Vendor assurance
D.
Vendor assurance
Answers
Suggested answer: A
asked 18/09/2024
Eric Zarghami
51 questions

Question 163

Report
Export
Collapse

Which of the following is considered best practice for preventing e-mail spoofing?

A.
Spam filtering
A.
Spam filtering
Answers
B.
Cryptographic signature
B.
Cryptographic signature
Answers
C.
Uniform Resource Locator (URL) filtering
C.
Uniform Resource Locator (URL) filtering
Answers
D.
Reverse Domain Name Service (DNS) lookup
D.
Reverse Domain Name Service (DNS) lookup
Answers
Suggested answer: B
asked 18/09/2024
Dominique Dusabe
42 questions

Question 164

Report
Export
Collapse

Alternate encoding such as hexadecimal representations is MOST often observed in which of the following forms of attack?

A.
Smurf
A.
Smurf
Answers
B.
Rootkit exploit
B.
Rootkit exploit
Answers
C.
Denial of Service (DoS)
C.
Denial of Service (DoS)
Answers
D.
Cross site scripting (XSS)
D.
Cross site scripting (XSS)
Answers
Suggested answer: D
asked 18/09/2024
Shane Cook
33 questions

Question 165

Report
Export
Collapse

What would be the PRIMARY concern when designing and coordinating a security assessment for an Automatic Teller Machine (ATM) system?

A.
Physical access to the electronic hardware
A.
Physical access to the electronic hardware
Answers
B.
Regularly scheduled maintenance process
B.
Regularly scheduled maintenance process
Answers
C.
Availability of the network connection
C.
Availability of the network connection
Answers
D.
Processing delays
D.
Processing delays
Answers
Suggested answer: A
asked 18/09/2024
Miguel Bakker
30 questions

Question 166

Report
Export
Collapse

The Hardware Abstraction Layer (HAL) is implemented in the

A.
system software.
A.
system software.
Answers
B.
system hardware.
B.
system hardware.
Answers
C.
application software.
C.
application software.
Answers
D.
network hardware.
D.
network hardware.
Answers
Suggested answer: A
asked 18/09/2024
BISWARUP KUNDU
41 questions

Question 167

Report
Export
Collapse

A security professional has just completed their organization's Business Impact Analysis (BIA).

Following Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) best practices, what would be the professional's NEXT step?

A.
Identify and select recovery strategies.
A.
Identify and select recovery strategies.
Answers
B.
Present the findings to management for funding.
B.
Present the findings to management for funding.
Answers
C.
Select members for the organization's recovery teams.
C.
Select members for the organization's recovery teams.
Answers
D.
Prepare a plan to test the organization's ability to recover its operations.
D.
Prepare a plan to test the organization's ability to recover its operations.
Answers
Suggested answer: A
asked 18/09/2024
Puth Sovann
42 questions

Question 168

Report
Export
Collapse

A vulnerability test on an Information System (IS) is conducted to

A.
exploit security weaknesses in the IS.
A.
exploit security weaknesses in the IS.
Answers
B.
measure system performance on systems with weak security controls.
B.
measure system performance on systems with weak security controls.
Answers
C.
evaluate the effectiveness of security controls.
C.
evaluate the effectiveness of security controls.
Answers
D.
prepare for Disaster Recovery (DR) planning.
D.
prepare for Disaster Recovery (DR) planning.
Answers
Suggested answer: C
asked 18/09/2024
Guillermo Carrasco
33 questions

Question 169

Report
Export
Collapse

Who must approve modifications to an organization's production infrastructure configuration?

A.
Technical management
A.
Technical management
Answers
B.
Change control board
B.
Change control board
Answers
C.
System operations
C.
System operations
Answers
D.
System users
D.
System users
Answers
Suggested answer: B
asked 18/09/2024
Jesus Vargas
48 questions

Question 170

Report
Export
Collapse

When implementing controls in a heterogeneous end-point network for an organization, it is critical that

A.
hosts are able to establish network communications.
A.
hosts are able to establish network communications.
Answers
B.
users can make modifications to their security software configurations.
B.
users can make modifications to their security software configurations.
Answers
C.
common software security components be implemented across all hosts.
C.
common software security components be implemented across all hosts.
Answers
D.
firewalls running on each host are fully customizable by the user.
D.
firewalls running on each host are fully customizable by the user.
Answers
Suggested answer: C
asked 18/09/2024
Miguel Villanueva
33 questions
Total 1.482 questions
Go to page: of 149