ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 21

Question list
Search
Search

Question 201

Report
Export
Collapse

With data labeling, which of the following MUST be the key decision maker?

A.
Information security
A.
Information security
Answers
B.
Departmental management
B.
Departmental management
Answers
C.
Data custodian
C.
Data custodian
Answers
D.
Data owner
D.
Data owner
Answers
Suggested answer: D
asked 18/09/2024
Brian Foy
40 questions

Question 202

Report
Export
Collapse

Which of the following is a critical factor for implementing a successful data classification program?

A.
Executive sponsorship
A.
Executive sponsorship
Answers
B.
Information security sponsorship
B.
Information security sponsorship
Answers
C.
End-user acceptance
C.
End-user acceptance
Answers
D.
Internal audit acceptance
D.
Internal audit acceptance
Answers
Suggested answer: A
asked 18/09/2024
Musaddiq Shorunke
44 questions

Question 203

Report
Export
Collapse

An organization's data policy MUST include a data retention period which is based on

A.
application dismissal.
A.
application dismissal.
Answers
B.
business procedures.
B.
business procedures.
Answers
C.
digital certificates expiration.
C.
digital certificates expiration.
Answers
D.
regulatory compliance.
D.
regulatory compliance.
Answers
Suggested answer: D
asked 18/09/2024
Kabi Bashala
36 questions

Question 204

Report
Export
Collapse

What is the MOST important reason to configure unique user IDs?

A.
Supporting accountability
A.
Supporting accountability
Answers
B.
Reducing authentication errors
B.
Reducing authentication errors
Answers
C.
Preventing password compromise
C.
Preventing password compromise
Answers
D.
Supporting Single Sign On (SSO)
D.
Supporting Single Sign On (SSO)
Answers
Suggested answer: A
asked 18/09/2024
Salah Dabwan
46 questions

Question 205

Report
Export
Collapse

What is the PRIMARY advantage of using automated application security testing tools?

A.
The application can be protected in the production environment.
A.
The application can be protected in the production environment.
Answers
B.
Large amounts of code can be tested using fewer resources.
B.
Large amounts of code can be tested using fewer resources.
Answers
C.
The application will fail less when tested using these tools.
C.
The application will fail less when tested using these tools.
Answers
D.
Detailed testing of code functions can be performed.
D.
Detailed testing of code functions can be performed.
Answers
Suggested answer: B
asked 18/09/2024
Laxman Paudel
25 questions

Question 206

Report
Export
Collapse

When using third-party software developers, which of the following is the MOST effective method of providing software development Quality Assurance (QA)?

A.
Retain intellectual property rights through contractual wording.
A.
Retain intellectual property rights through contractual wording.
Answers
B.
Perform overlapping code reviews by both parties.
B.
Perform overlapping code reviews by both parties.
Answers
C.
Verify that the contractors attend development planning meetings.
C.
Verify that the contractors attend development planning meetings.
Answers
D.
Create a separate contractor development environment.
D.
Create a separate contractor development environment.
Answers
Suggested answer: B
asked 18/09/2024
Peter Klaffehn
45 questions

Question 207

Report
Export
Collapse

What do Capability Maturity Models (CMM) serve as a benchmark for in an organization?

A.
Experience in the industry
A.
Experience in the industry
Answers
B.
Definition of security profiles
B.
Definition of security profiles
Answers
C.
Human resource planning efforts
C.
Human resource planning efforts
Answers
D.
Procedures in systems development
D.
Procedures in systems development
Answers
Suggested answer: D
asked 18/09/2024
Michael Akinpelu
34 questions

Question 208

Report
Export
Collapse

Which of the following is the MOST crucial for a successful audit plan?

A.
Defining the scope of the audit to be performed
A.
Defining the scope of the audit to be performed
Answers
B.
Identifying the security controls to be implemented
B.
Identifying the security controls to be implemented
Answers
C.
Working with the system owner on new controls
C.
Working with the system owner on new controls
Answers
D.
Acquiring evidence of systems that are not compliant
D.
Acquiring evidence of systems that are not compliant
Answers
Suggested answer: A
asked 18/09/2024
dion alken
40 questions

Question 209

Report
Export
Collapse

An organization decides to implement a partial Public Key Infrastructure (PKI) with only the servers having digital certificates. What is the security benefit of this implementation?

A.
Clients can authenticate themselves to the servers.
A.
Clients can authenticate themselves to the servers.
Answers
B.
Mutual authentication is available between the clients and servers.
B.
Mutual authentication is available between the clients and servers.
Answers
C.
Servers are able to issue digital certificates to the client.
C.
Servers are able to issue digital certificates to the client.
Answers
D.
Servers can authenticate themselves to the client.
D.
Servers can authenticate themselves to the client.
Answers
Suggested answer: D
asked 18/09/2024
Tom Starren
43 questions

Question 210

Report
Export
Collapse

Which of the following is the PRIMARY benefit of a formalized information classification program?

A.
It drives audit processes.
A.
It drives audit processes.
Answers
B.
It supports risk assessment.
B.
It supports risk assessment.
Answers
C.
It reduces asset vulnerabilities.
C.
It reduces asset vulnerabilities.
Answers
D.
It minimizes system logging requirements.
D.
It minimizes system logging requirements.
Answers
Suggested answer: B
asked 18/09/2024
Sriharsha Janga
43 questions
Total 1.482 questions
Go to page: of 149