ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 24

Question list
Search
Search

Which of the following is the MOST difficult to enforce when using cloud computing?

A.
Data access
A.
Data access
Answers
B.
Data backup
B.
Data backup
Answers
C.
Data recovery
C.
Data recovery
Answers
D.
Data disposal
D.
Data disposal
Answers
Suggested answer: D

Which of the following is the BEST way to determine if a particular system is able to identify malicious software without executing it?

A.
Testing with a Botnet
A.
Testing with a Botnet
Answers
B.
Testing with an EICAR file
B.
Testing with an EICAR file
Answers
C.
Executing a binary shellcode
C.
Executing a binary shellcode
Answers
D.
Run multiple antivirus programs
D.
Run multiple antivirus programs
Answers
Suggested answer: B

Which of the following is a BEST practice when traveling internationally with laptops containing Personally Identifiable Information (PII)?

A.
Use a thumb drive to transfer information from a foreign computer.
A.
Use a thumb drive to transfer information from a foreign computer.
Answers
B.
Do not take unnecessary information, including sensitive information.
B.
Do not take unnecessary information, including sensitive information.
Answers
C.
Connect the laptop only to well-known networks like the hotel or public Internet cafes.
C.
Connect the laptop only to well-known networks like the hotel or public Internet cafes.
Answers
D.
Request international points of contact help scan the laptop on arrival to ensure it is protected.
D.
Request international points of contact help scan the laptop on arrival to ensure it is protected.
Answers
Suggested answer: B

Which of the following assures that rules are followed in an identity management architecture?

A.
Policy database
A.
Policy database
Answers
B.
Digital signature
B.
Digital signature
Answers
C.
Policy decision point
C.
Policy decision point
Answers
D.
Policy enforcement point
D.
Policy enforcement point
Answers
Suggested answer: D

Which of the following violates identity and access management best practices?

A.
User accounts
A.
User accounts
Answers
B.
System accounts
B.
System accounts
Answers
C.
Generic accounts
C.
Generic accounts
Answers
D.
Privileged accounts
D.
Privileged accounts
Answers
Suggested answer: C

When dealing with compliance with the Payment Card Industry-Data Security Standard (PCI-DSS), an organization that shares card holder information with a service provider MUST do which of the following?

A.
Perform a service provider PCI-DSS assessment on a yearly basis.
A.
Perform a service provider PCI-DSS assessment on a yearly basis.
Answers
B.
Validate the service provider's PCI-DSS compliance status on a regular basis.
B.
Validate the service provider's PCI-DSS compliance status on a regular basis.
Answers
C.
Validate that the service providers security policies are in alignment with those of the organization.
C.
Validate that the service providers security policies are in alignment with those of the organization.
Answers
D.
Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis.
D.
Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis.
Answers
Suggested answer: B

What is the MAIN feature that onion routing networks offer?

A.
Non-repudiation
A.
Non-repudiation
Answers
B.
Traceability
B.
Traceability
Answers
C.
Anonymity
C.
Anonymity
Answers
D.
Resilience
D.
Resilience
Answers
Suggested answer: C

Which of the following MUST system and database administrators be aware of and apply when configuring systems used for storing personal employee data?

A.
Secondary use of the data by business users
A.
Secondary use of the data by business users
Answers
B.
The organization's security policies and standards
B.
The organization's security policies and standards
Answers
C.
The business purpose for which the data is to be used
C.
The business purpose for which the data is to be used
Answers
D.
The overall protection of corporate resources and data
D.
The overall protection of corporate resources and data
Answers
Suggested answer: B

Which of the following methods provides the MOST protection for user credentials?

A.
Forms-based authentication
A.
Forms-based authentication
Answers
B.
Digest authentication
B.
Digest authentication
Answers
C.
Basic authentication
C.
Basic authentication
Answers
D.
Self-registration
D.
Self-registration
Answers
Suggested answer: B

Which of the following MOST influences the design of the organization's electronic monitoring policies?

A.
Workplace privacy laws
A.
Workplace privacy laws
Answers
B.
Level of organizational trust
B.
Level of organizational trust
Answers
C.
Results of background checks
C.
Results of background checks
Answers
D.
Business ethical considerations
D.
Business ethical considerations
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149