ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 25

Question list
Search
Search

Without proper signal protection, embedded systems may be prone to which type of attack?

A.
Brute force
A.
Brute force
Answers
B.
Tampering
B.
Tampering
Answers
C.
Information disclosure
C.
Information disclosure
Answers
D.
Denial of Service (DoS)
D.
Denial of Service (DoS)
Answers
Suggested answer: C

Which of the following is a detective access control mechanism?

A.
Log review
A.
Log review
Answers
B.
Least privilege
B.
Least privilege
Answers
C.
Password complexity
C.
Password complexity
Answers
D.
Non-disclosure agreement
D.
Non-disclosure agreement
Answers
Suggested answer: A

Which of the following BEST describes Recovery Time Objective (RTO)?

A.
Time of data validation after disaster
A.
Time of data validation after disaster
Answers
B.
Time of data restoration from backup after disaster
B.
Time of data restoration from backup after disaster
Answers
C.
Time of application resumption after disaster
C.
Time of application resumption after disaster
Answers
D.
Time of application verification after disaster
D.
Time of application verification after disaster
Answers
Suggested answer: C

An organization publishes and periodically updates its employee policies in a file on their intranet.

Which of the following is a PRIMARY security concern?

A.
Availability
A.
Availability
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Integrity
C.
Integrity
Answers
D.
Ownership
D.
Ownership
Answers
Suggested answer: A

An online retail company has formulated a record retention schedule for customer transactions.

Which of the following is a valid reason a customer transaction is kept beyond the retention schedule?

A.
Pending legal hold
A.
Pending legal hold
Answers
B.
Long term data mining needs
B.
Long term data mining needs
Answers
C.
Customer makes request to retain
C.
Customer makes request to retain
Answers
D.
Useful for future business initiatives
D.
Useful for future business initiatives
Answers
Suggested answer: A

Which of the following is the MAIN goal of a data retention policy?

A.
Ensure that data is destroyed properly.
A.
Ensure that data is destroyed properly.
Answers
B.
Ensure that data recovery can be done on the datA.
B.
Ensure that data recovery can be done on the datA.
Answers
C.
Ensure the integrity and availability of data for a predetermined amount of time.
C.
Ensure the integrity and availability of data for a predetermined amount of time.
Answers
D.
Ensure the integrity and confidentiality of data for a predetermined amount of time.
D.
Ensure the integrity and confidentiality of data for a predetermined amount of time.
Answers
Suggested answer: C

Which of the following problems is not addressed by using OAuth (Open Standard to Authorization) 2.0 to integrate a third-party identity provider for a service?

A.
Resource Servers are required to use passwords to authenticate end users.
A.
Resource Servers are required to use passwords to authenticate end users.
Answers
B.
Revocation of access of some users of the third party instead of all the users from the third party.
B.
Revocation of access of some users of the third party instead of all the users from the third party.
Answers
C.
Compromise of the third party means compromise of all the users in the service.
C.
Compromise of the third party means compromise of all the users in the service.
Answers
D.
Guest users need to authenticate with the third party identity provider.
D.
Guest users need to authenticate with the third party identity provider.
Answers
Suggested answer: A

The use of proximity card to gain access to a building is an example of what type of security control?

A.
Legal
A.
Legal
Answers
B.
Logical
B.
Logical
Answers
C.
Physical
C.
Physical
Answers
D.
Procedural
D.
Procedural
Answers
Suggested answer: C

Multi-Factor Authentication (MFA) is necessary in many systems given common types of password attacks. Which of the following is a correct list of password attacks?

A.
Masquerading, salami, malware, polymorphism
A.
Masquerading, salami, malware, polymorphism
Answers
B.
Brute force, dictionary, phishing, keylogger
B.
Brute force, dictionary, phishing, keylogger
Answers
C.
Zeus, netbus, rabbit, turtle
C.
Zeus, netbus, rabbit, turtle
Answers
D.
Token, biometrics, IDS, DLP
D.
Token, biometrics, IDS, DLP
Answers
Suggested answer: B

Which of the following is an example of two-factor authentication?

A.
Retina scan and a palm print
A.
Retina scan and a palm print
Answers
B.
Fingerprint and a smart card
B.
Fingerprint and a smart card
Answers
C.
Magnetic stripe card and an ID badge
C.
Magnetic stripe card and an ID badge
Answers
D.
Password and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
D.
Password and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149