ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

A large university needs to enable student access to university resources from their homes. Which of the following provides the BEST option for low maintenance and ease of deployment?

A.
Provide students with Internet Protocol Security (IPSec) Virtual Private Network (VPN) client software.
A.
Provide students with Internet Protocol Security (IPSec) Virtual Private Network (VPN) client software.
Answers
B.
Use Secure Sockets Layer (SSL) VPN technology.
B.
Use Secure Sockets Layer (SSL) VPN technology.
Answers
C.
Use Secure Shell (SSH) with public/private keys.
C.
Use Secure Shell (SSH) with public/private keys.
Answers
D.
Require students to purchase home router capable of VPN.
D.
Require students to purchase home router capable of VPN.
Answers
Suggested answer: B

A risk assessment report recommends upgrading all perimeter firewalls to mitigate a particular finding. Which of the following BEST supports this recommendation?

A.
The inherent risk is greater than the residual risk.
A.
The inherent risk is greater than the residual risk.
Answers
B.
The Annualized Loss Expectancy (ALE) approaches zero.
B.
The Annualized Loss Expectancy (ALE) approaches zero.
Answers
C.
The expected loss from the risk exceeds mitigation costs.
C.
The expected loss from the risk exceeds mitigation costs.
Answers
D.
The infrastructure budget can easily cover the upgrade costs.
D.
The infrastructure budget can easily cover the upgrade costs.
Answers
Suggested answer: C

A system is developed so that its business users can perform business functions but not user administration functions. Application administrators can perform administration functions but not user business functions. These capabilities are

BEST described as

A.
least privilege.
A.
least privilege.
Answers
B.
rule based access controls.
B.
rule based access controls.
Answers
C.
Mandatory Access Control (MAC).
C.
Mandatory Access Control (MAC).
Answers
D.
separation of duties.
D.
separation of duties.
Answers
Suggested answer: D

What is the MOST effective method for gaining unauthorized access to a file protected with a long complex password?

A.
Brute force attack
A.
Brute force attack
Answers
B.
Frequency analysis
B.
Frequency analysis
Answers
C.
Social engineering
C.
Social engineering
Answers
D.
Dictionary attack
D.
Dictionary attack
Answers
Suggested answer: C

A security manager has noticed an inconsistent application of server security controls resulting in vulnerabilities on critical systems. What is the MOST likely cause of this issue?

A.
A lack of baseline standards
A.
A lack of baseline standards
Answers
B.
Improper documentation of security guidelines
B.
Improper documentation of security guidelines
Answers
C.
A poorly designed security policy communication program
C.
A poorly designed security policy communication program
Answers
D.
Host-based Intrusion Prevention System (HIPS) policies are ineffective
D.
Host-based Intrusion Prevention System (HIPS) policies are ineffective
Answers
Suggested answer: A

Which of the following is the BEST countermeasure to brute force login attacks?

A.
Changing all canonical passwords
A.
Changing all canonical passwords
Answers
B.
Decreasing the number of concurrent user sessions
B.
Decreasing the number of concurrent user sessions
Answers
C.
Restricting initial password delivery only in person
C.
Restricting initial password delivery only in person
Answers
D.
Introducing a delay after failed system access attempts
D.
Introducing a delay after failed system access attempts
Answers
Suggested answer: D

A Business Continuity Plan (BCP) is based on

A.
the policy and procedures manual.
A.
the policy and procedures manual.
Answers
B.
an existing BCP from a similar organization.
B.
an existing BCP from a similar organization.
Answers
C.
a review of the business processes and procedures.
C.
a review of the business processes and procedures.
Answers
D.
a standard checklist of required items and objectives.
D.
a standard checklist of required items and objectives.
Answers
Suggested answer: D

When implementing a secure wireless network, which of the following supports authentication and authorization for individual client endpoints?

A.
Temporal Key Integrity Protocol (TKIP)
A.
Temporal Key Integrity Protocol (TKIP)
Answers
B.
Wi-Fi Protected Access (WPA) Pre-Shared Key (PSK)
B.
Wi-Fi Protected Access (WPA) Pre-Shared Key (PSK)
Answers
C.
Wi-Fi Protected Access 2 (WPA2) Enterprise
C.
Wi-Fi Protected Access 2 (WPA2) Enterprise
Answers
D.
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
D.
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Answers
Suggested answer: C

A thorough review of an organization's audit logs finds that a disgruntled network administrator has intercepted emails meant for the Chief Executive Officer (CEO) and changed them before forwarding them to their intended recipient. What type of attack has MOST likely occurred?

A.
Spoofing
A.
Spoofing
Answers
B.
Eavesdropping
B.
Eavesdropping
Answers
C.
Man-in-the-middle
C.
Man-in-the-middle
Answers
D.
Denial of service
D.
Denial of service
Answers
Suggested answer: C

Which of the following is the MOST effective attack against cryptographic hardware modules?

A.
Plaintext
A.
Plaintext
Answers
B.
Brute force
B.
Brute force
Answers
C.
Power analysis
C.
Power analysis
Answers
D.
Man-in-the-middle (MITM)
D.
Man-in-the-middle (MITM)
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149