ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 25

List of questions

Question 241

Report Export Collapse

Without proper signal protection, embedded systems may be prone to which type of attack?

Brute force
Brute force
Tampering
Tampering
Information disclosure
Information disclosure
Denial of Service (DoS)
Denial of Service (DoS)
Suggested answer: C
asked 18/09/2024
Alfredo Gonzalez
42 questions

Question 242

Report Export Collapse

Which of the following is a detective access control mechanism?

Log review
Log review
Least privilege
Least privilege
Password complexity
Password complexity
Non-disclosure agreement
Non-disclosure agreement
Suggested answer: A
asked 18/09/2024
Tuan Nguyen
48 questions

Question 243

Report Export Collapse

Which of the following BEST describes Recovery Time Objective (RTO)?

Time of data validation after disaster
Time of data validation after disaster
Time of data restoration from backup after disaster
Time of data restoration from backup after disaster
Time of application resumption after disaster
Time of application resumption after disaster
Time of application verification after disaster
Time of application verification after disaster
Suggested answer: C
asked 18/09/2024
Mike Schatens
37 questions

Question 244

Report Export Collapse

An organization publishes and periodically updates its employee policies in a file on their intranet.

Which of the following is a PRIMARY security concern?

Availability
Availability
Confidentiality
Confidentiality
Integrity
Integrity
Ownership
Ownership
Suggested answer: A
asked 18/09/2024
Harry Vervelde
43 questions

Question 245

Report Export Collapse

An online retail company has formulated a record retention schedule for customer transactions.

Which of the following is a valid reason a customer transaction is kept beyond the retention schedule?

Pending legal hold
Pending legal hold
Long term data mining needs
Long term data mining needs
Customer makes request to retain
Customer makes request to retain
Useful for future business initiatives
Useful for future business initiatives
Suggested answer: A
asked 18/09/2024
Harold van den Meijdenberg
33 questions

Question 246

Report Export Collapse

Which of the following is the MAIN goal of a data retention policy?

Ensure that data is destroyed properly.
Ensure that data is destroyed properly.
Ensure that data recovery can be done on the datA.
Ensure that data recovery can be done on the datA.
Ensure the integrity and availability of data for a predetermined amount of time.
Ensure the integrity and availability of data for a predetermined amount of time.
Ensure the integrity and confidentiality of data for a predetermined amount of time.
Ensure the integrity and confidentiality of data for a predetermined amount of time.
Suggested answer: C
asked 18/09/2024
james campbell
41 questions

Question 247

Report Export Collapse

Which of the following problems is not addressed by using OAuth (Open Standard to Authorization) 2.0 to integrate a third-party identity provider for a service?

Resource Servers are required to use passwords to authenticate end users.
Resource Servers are required to use passwords to authenticate end users.
Revocation of access of some users of the third party instead of all the users from the third party.
Revocation of access of some users of the third party instead of all the users from the third party.
Compromise of the third party means compromise of all the users in the service.
Compromise of the third party means compromise of all the users in the service.
Guest users need to authenticate with the third party identity provider.
Guest users need to authenticate with the third party identity provider.
Suggested answer: A
asked 18/09/2024
Mark Arnold Santos
48 questions

Question 248

Report Export Collapse

The use of proximity card to gain access to a building is an example of what type of security control?

Legal
Legal
Logical
Logical
Physical
Physical
Procedural
Procedural
Suggested answer: C
asked 18/09/2024
Ryan Lee
28 questions

Question 249

Report Export Collapse

Multi-Factor Authentication (MFA) is necessary in many systems given common types of password attacks. Which of the following is a correct list of password attacks?

Masquerading, salami, malware, polymorphism
Masquerading, salami, malware, polymorphism
Brute force, dictionary, phishing, keylogger
Brute force, dictionary, phishing, keylogger
Zeus, netbus, rabbit, turtle
Zeus, netbus, rabbit, turtle
Token, biometrics, IDS, DLP
Token, biometrics, IDS, DLP
Suggested answer: B
asked 18/09/2024
Conceicao Damasceno
38 questions

Question 250

Report Export Collapse

Which of the following is an example of two-factor authentication?

Retina scan and a palm print
Retina scan and a palm print
Fingerprint and a smart card
Fingerprint and a smart card
Magnetic stripe card and an ID badge
Magnetic stripe card and an ID badge
Password and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
Password and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
Suggested answer: B
asked 18/09/2024
Susan Brady
51 questions
Total 1.482 questions
Go to page: of 149