ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 17

List of questions

Question 161

Report Export Collapse

When designing a networked Information System (IS) where there will be several different types of individual access, what is the FIRST step that should be taken to ensure all access control requirements are addressed?

Create a user profile.
Create a user profile.
Create a user access matrix.
Create a user access matrix.
Develop an Access Control List (ACL).
Develop an Access Control List (ACL).
Develop a Role Based Access Control (RBAC) list.
Develop a Role Based Access Control (RBAC) list.
Suggested answer: B
asked 18/09/2024
Robert Andrade
54 questions

Question 162

Report Export Collapse

Which of the following is the BEST way to verify the integrity of a software patch?

Cryptographic checksums
Cryptographic checksums
Version numbering
Version numbering
Automatic updates
Automatic updates
Vendor assurance
Vendor assurance
Suggested answer: A
asked 18/09/2024
Eric Zarghami
55 questions

Question 163

Report Export Collapse

Which of the following is considered best practice for preventing e-mail spoofing?

Spam filtering
Spam filtering
Cryptographic signature
Cryptographic signature
Uniform Resource Locator (URL) filtering
Uniform Resource Locator (URL) filtering
Reverse Domain Name Service (DNS) lookup
Reverse Domain Name Service (DNS) lookup
Suggested answer: B
asked 18/09/2024
Dominique Dusabe
47 questions

Question 164

Report Export Collapse

Alternate encoding such as hexadecimal representations is MOST often observed in which of the following forms of attack?

Smurf
Smurf
Rootkit exploit
Rootkit exploit
Denial of Service (DoS)
Denial of Service (DoS)
Cross site scripting (XSS)
Cross site scripting (XSS)
Suggested answer: D
asked 18/09/2024
Shane Cook
39 questions

Question 165

Report Export Collapse

What would be the PRIMARY concern when designing and coordinating a security assessment for an Automatic Teller Machine (ATM) system?

Physical access to the electronic hardware
Physical access to the electronic hardware
Regularly scheduled maintenance process
Regularly scheduled maintenance process
Availability of the network connection
Availability of the network connection
Processing delays
Processing delays
Suggested answer: A
asked 18/09/2024
Miguel Bakker
35 questions

Question 166

Report Export Collapse

The Hardware Abstraction Layer (HAL) is implemented in the

system software.
system software.
system hardware.
system hardware.
application software.
application software.
network hardware.
network hardware.
Suggested answer: A
asked 18/09/2024
BISWARUP KUNDU
45 questions

Question 167

Report Export Collapse

A security professional has just completed their organization's Business Impact Analysis (BIA).

Following Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) best practices, what would be the professional's NEXT step?

Identify and select recovery strategies.
Identify and select recovery strategies.
Present the findings to management for funding.
Present the findings to management for funding.
Select members for the organization's recovery teams.
Select members for the organization's recovery teams.
Prepare a plan to test the organization's ability to recover its operations.
Prepare a plan to test the organization's ability to recover its operations.
Suggested answer: A
asked 18/09/2024
Puth Sovann
51 questions

Question 168

Report Export Collapse

A vulnerability test on an Information System (IS) is conducted to

exploit security weaknesses in the IS.
exploit security weaknesses in the IS.
measure system performance on systems with weak security controls.
measure system performance on systems with weak security controls.
evaluate the effectiveness of security controls.
evaluate the effectiveness of security controls.
prepare for Disaster Recovery (DR) planning.
prepare for Disaster Recovery (DR) planning.
Suggested answer: C
asked 18/09/2024
Guillermo Carrasco
36 questions

Question 169

Report Export Collapse

Who must approve modifications to an organization's production infrastructure configuration?

Technical management
Technical management
Change control board
Change control board
System operations
System operations
System users
System users
Suggested answer: B
asked 18/09/2024
Jesus Vargas
57 questions

Question 170

Report Export Collapse

When implementing controls in a heterogeneous end-point network for an organization, it is critical that

hosts are able to establish network communications.
hosts are able to establish network communications.
users can make modifications to their security software configurations.
users can make modifications to their security software configurations.
common software security components be implemented across all hosts.
common software security components be implemented across all hosts.
firewalls running on each host are fully customizable by the user.
firewalls running on each host are fully customizable by the user.
Suggested answer: C
asked 18/09/2024
Miguel Villanueva
36 questions
Total 1.482 questions
Go to page: of 149