ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 24

List of questions

Question 231

Report Export Collapse

Which of the following is the MOST difficult to enforce when using cloud computing?

Data access
Data access
Data backup
Data backup
Data recovery
Data recovery
Data disposal
Data disposal
Suggested answer: D
asked 18/09/2024
Aparecido Lemos
41 questions

Question 232

Report Export Collapse

Which of the following is the BEST way to determine if a particular system is able to identify malicious software without executing it?

Testing with a Botnet
Testing with a Botnet
Testing with an EICAR file
Testing with an EICAR file
Executing a binary shellcode
Executing a binary shellcode
Run multiple antivirus programs
Run multiple antivirus programs
Suggested answer: B
asked 18/09/2024
Giulia Alberghi
45 questions

Question 233

Report Export Collapse

Which of the following is a BEST practice when traveling internationally with laptops containing Personally Identifiable Information (PII)?

Use a thumb drive to transfer information from a foreign computer.
Use a thumb drive to transfer information from a foreign computer.
Do not take unnecessary information, including sensitive information.
Do not take unnecessary information, including sensitive information.
Connect the laptop only to well-known networks like the hotel or public Internet cafes.
Connect the laptop only to well-known networks like the hotel or public Internet cafes.
Request international points of contact help scan the laptop on arrival to ensure it is protected.
Request international points of contact help scan the laptop on arrival to ensure it is protected.
Suggested answer: B
asked 18/09/2024
Joseph Varghese
43 questions

Question 234

Report Export Collapse

Which of the following assures that rules are followed in an identity management architecture?

Policy database
Policy database
Digital signature
Digital signature
Policy decision point
Policy decision point
Policy enforcement point
Policy enforcement point
Suggested answer: D
asked 18/09/2024
Wislon Pereira
41 questions

Question 235

Report Export Collapse

Which of the following violates identity and access management best practices?

User accounts
User accounts
System accounts
System accounts
Generic accounts
Generic accounts
Privileged accounts
Privileged accounts
Suggested answer: C
asked 18/09/2024
JP Pelovello
54 questions

Question 236

Report Export Collapse

When dealing with compliance with the Payment Card Industry-Data Security Standard (PCI-DSS), an organization that shares card holder information with a service provider MUST do which of the following?

Perform a service provider PCI-DSS assessment on a yearly basis.
Perform a service provider PCI-DSS assessment on a yearly basis.
Validate the service provider's PCI-DSS compliance status on a regular basis.
Validate the service provider's PCI-DSS compliance status on a regular basis.
Validate that the service providers security policies are in alignment with those of the organization.
Validate that the service providers security policies are in alignment with those of the organization.
Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis.
Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis.
Suggested answer: B
asked 18/09/2024
Kefash White
44 questions

Question 237

Report Export Collapse

What is the MAIN feature that onion routing networks offer?

Non-repudiation
Non-repudiation
Traceability
Traceability
Anonymity
Anonymity
Resilience
Resilience
Suggested answer: C
asked 18/09/2024
FOTIS FOURLIAS
48 questions

Question 238

Report Export Collapse

Which of the following MUST system and database administrators be aware of and apply when configuring systems used for storing personal employee data?

Secondary use of the data by business users
Secondary use of the data by business users
The organization's security policies and standards
The organization's security policies and standards
The business purpose for which the data is to be used
The business purpose for which the data is to be used
The overall protection of corporate resources and data
The overall protection of corporate resources and data
Suggested answer: B
asked 18/09/2024
Robert Andrade
54 questions

Question 239

Report Export Collapse

Which of the following methods provides the MOST protection for user credentials?

Forms-based authentication
Forms-based authentication
Digest authentication
Digest authentication
Basic authentication
Basic authentication
Self-registration
Self-registration
Suggested answer: B
asked 18/09/2024
Fahad Mustafa
48 questions

Question 240

Report Export Collapse

Which of the following MOST influences the design of the organization's electronic monitoring policies?

Workplace privacy laws
Workplace privacy laws
Level of organizational trust
Level of organizational trust
Results of background checks
Results of background checks
Business ethical considerations
Business ethical considerations
Suggested answer: A
asked 18/09/2024
Priyantha Perea
45 questions
Total 1.482 questions
Go to page: of 149