ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 20

Question list
Search
Search

When is security personnel involvement in the Systems Development Life Cycle (SDLC) process MOST beneficial?

A.
Testing phase
A.
Testing phase
Answers
B.
Development phase
B.
Development phase
Answers
C.
Requirements definition phase
C.
Requirements definition phase
Answers
D.
Operations and maintenance phase
D.
Operations and maintenance phase
Answers
Suggested answer: C

A large bank deploys hardware tokens to all customers that use their online banking system. The token generates and displays a six digit numeric password every 60 seconds. The customers must log into their bank accounts using this numeric password. This is an example of

A.
asynchronous token.
A.
asynchronous token.
Answers
B.
Single Sign-On (SSO) token.
B.
Single Sign-On (SSO) token.
Answers
C.
single factor authentication token.
C.
single factor authentication token.
Answers
D.
synchronous token.
D.
synchronous token.
Answers
Suggested answer: D

Which of the following is the BEST reason to review audit logs periodically?

A.
Verify they are operating properly
A.
Verify they are operating properly
Answers
B.
Monitor employee productivity
B.
Monitor employee productivity
Answers
C.
Identify anomalies in use patterns
C.
Identify anomalies in use patterns
Answers
D.
Meet compliance regulations
D.
Meet compliance regulations
Answers
Suggested answer: C

What is the PRIMARY reason for ethics awareness and related policy implementation?

A.
It affects the workflow of an organization.
A.
It affects the workflow of an organization.
Answers
B.
It affects the reputation of an organization.
B.
It affects the reputation of an organization.
Answers
C.
It affects the retention rate of employees.
C.
It affects the retention rate of employees.
Answers
D.
It affects the morale of the employees.
D.
It affects the morale of the employees.
Answers
Suggested answer: B

Which of the following is critical for establishing an initial baseline for software components in the operation and maintenance of applications?

A.
Application monitoring procedures
A.
Application monitoring procedures
Answers
B.
Configuration control procedures
B.
Configuration control procedures
Answers
C.
Security audit procedures
C.
Security audit procedures
Answers
D.
Software patching procedures
D.
Software patching procedures
Answers
Suggested answer: B

Which of the following actions MUST be taken if a vulnerability is discovered during the maintenance stage in a System Development Life Cycle (SDLC)?

A.
Make changes following principle and design guidelines.
A.
Make changes following principle and design guidelines.
Answers
B.
Stop the application until the vulnerability is fixed.
B.
Stop the application until the vulnerability is fixed.
Answers
C.
Report the vulnerability to product owner.
C.
Report the vulnerability to product owner.
Answers
D.
Monitor the application and review code.
D.
Monitor the application and review code.
Answers
Suggested answer: C

Which of the following provides effective management assurance for a Wireless Local Area Network (WLAN)?

A.
Maintaining an inventory of authorized Access Points (AP) and connecting devices
A.
Maintaining an inventory of authorized Access Points (AP) and connecting devices
Answers
B.
Setting the radio frequency to the minimum range required
B.
Setting the radio frequency to the minimum range required
Answers
C.
Establishing a Virtual Private Network (VPN) tunnel between the WLAN client device and a VPN concentrator
C.
Establishing a Virtual Private Network (VPN) tunnel between the WLAN client device and a VPN concentrator
Answers
D.
Verifying that all default passwords have been changed
D.
Verifying that all default passwords have been changed
Answers
Suggested answer: A

From a security perspective, which of the following is a best practice to configure a Domain Name Service (DNS) system?

A.
Configure secondary servers to use the primary server as a zone forwarder.
A.
Configure secondary servers to use the primary server as a zone forwarder.
Answers
B.
Block all Transmission Control Protocol (TCP) connections.
B.
Block all Transmission Control Protocol (TCP) connections.
Answers
C.
Disable all recursive queries on the name servers.
C.
Disable all recursive queries on the name servers.
Answers
D.
Limit zone transfers to authorized devices.
D.
Limit zone transfers to authorized devices.
Answers
Suggested answer: D

Which of the following is the MOST beneficial to review when performing an IT audit?

A.
Audit policy
A.
Audit policy
Answers
B.
Security log
B.
Security log
Answers
C.
Security policies
C.
Security policies
Answers
D.
Configuration settings
D.
Configuration settings
Answers
Suggested answer: C

During an investigation of database theft from an organization's web site, it was determined that the Structured Query Language (SQL) injection technique was used despite input validation with clientside scripting. Which of the following provides the GREATEST protection against the same attack occurring again?

A.
Encrypt communications between the servers
A.
Encrypt communications between the servers
Answers
B.
Encrypt the web server traffic
B.
Encrypt the web server traffic
Answers
C.
Implement server-side filtering
C.
Implement server-side filtering
Answers
D.
Filter outgoing traffic at the perimeter firewall
D.
Filter outgoing traffic at the perimeter firewall
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149