ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 17

Question list
Search
Search

When designing a networked Information System (IS) where there will be several different types of individual access, what is the FIRST step that should be taken to ensure all access control requirements are addressed?

A.
Create a user profile.
A.
Create a user profile.
Answers
B.
Create a user access matrix.
B.
Create a user access matrix.
Answers
C.
Develop an Access Control List (ACL).
C.
Develop an Access Control List (ACL).
Answers
D.
Develop a Role Based Access Control (RBAC) list.
D.
Develop a Role Based Access Control (RBAC) list.
Answers
Suggested answer: B

Which of the following is the BEST way to verify the integrity of a software patch?

A.
Cryptographic checksums
A.
Cryptographic checksums
Answers
B.
Version numbering
B.
Version numbering
Answers
C.
Automatic updates
C.
Automatic updates
Answers
D.
Vendor assurance
D.
Vendor assurance
Answers
Suggested answer: A

Which of the following is considered best practice for preventing e-mail spoofing?

A.
Spam filtering
A.
Spam filtering
Answers
B.
Cryptographic signature
B.
Cryptographic signature
Answers
C.
Uniform Resource Locator (URL) filtering
C.
Uniform Resource Locator (URL) filtering
Answers
D.
Reverse Domain Name Service (DNS) lookup
D.
Reverse Domain Name Service (DNS) lookup
Answers
Suggested answer: B

Alternate encoding such as hexadecimal representations is MOST often observed in which of the following forms of attack?

A.
Smurf
A.
Smurf
Answers
B.
Rootkit exploit
B.
Rootkit exploit
Answers
C.
Denial of Service (DoS)
C.
Denial of Service (DoS)
Answers
D.
Cross site scripting (XSS)
D.
Cross site scripting (XSS)
Answers
Suggested answer: D

What would be the PRIMARY concern when designing and coordinating a security assessment for an Automatic Teller Machine (ATM) system?

A.
Physical access to the electronic hardware
A.
Physical access to the electronic hardware
Answers
B.
Regularly scheduled maintenance process
B.
Regularly scheduled maintenance process
Answers
C.
Availability of the network connection
C.
Availability of the network connection
Answers
D.
Processing delays
D.
Processing delays
Answers
Suggested answer: A

The Hardware Abstraction Layer (HAL) is implemented in the

A.
system software.
A.
system software.
Answers
B.
system hardware.
B.
system hardware.
Answers
C.
application software.
C.
application software.
Answers
D.
network hardware.
D.
network hardware.
Answers
Suggested answer: A

A security professional has just completed their organization's Business Impact Analysis (BIA).

Following Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) best practices, what would be the professional's NEXT step?

A.
Identify and select recovery strategies.
A.
Identify and select recovery strategies.
Answers
B.
Present the findings to management for funding.
B.
Present the findings to management for funding.
Answers
C.
Select members for the organization's recovery teams.
C.
Select members for the organization's recovery teams.
Answers
D.
Prepare a plan to test the organization's ability to recover its operations.
D.
Prepare a plan to test the organization's ability to recover its operations.
Answers
Suggested answer: A

A vulnerability test on an Information System (IS) is conducted to

A.
exploit security weaknesses in the IS.
A.
exploit security weaknesses in the IS.
Answers
B.
measure system performance on systems with weak security controls.
B.
measure system performance on systems with weak security controls.
Answers
C.
evaluate the effectiveness of security controls.
C.
evaluate the effectiveness of security controls.
Answers
D.
prepare for Disaster Recovery (DR) planning.
D.
prepare for Disaster Recovery (DR) planning.
Answers
Suggested answer: C

Who must approve modifications to an organization's production infrastructure configuration?

A.
Technical management
A.
Technical management
Answers
B.
Change control board
B.
Change control board
Answers
C.
System operations
C.
System operations
Answers
D.
System users
D.
System users
Answers
Suggested answer: B

When implementing controls in a heterogeneous end-point network for an organization, it is critical that

A.
hosts are able to establish network communications.
A.
hosts are able to establish network communications.
Answers
B.
users can make modifications to their security software configurations.
B.
users can make modifications to their security software configurations.
Answers
C.
common software security components be implemented across all hosts.
C.
common software security components be implemented across all hosts.
Answers
D.
firewalls running on each host are fully customizable by the user.
D.
firewalls running on each host are fully customizable by the user.
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149