ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 25

Question list
Search
Search

Question 241

Report
Export
Collapse

Without proper signal protection, embedded systems may be prone to which type of attack?

A.
Brute force
A.
Brute force
Answers
B.
Tampering
B.
Tampering
Answers
C.
Information disclosure
C.
Information disclosure
Answers
D.
Denial of Service (DoS)
D.
Denial of Service (DoS)
Answers
Suggested answer: C
asked 18/09/2024
Alfredo Gonzalez
34 questions

Question 242

Report
Export
Collapse

Which of the following is a detective access control mechanism?

A.
Log review
A.
Log review
Answers
B.
Least privilege
B.
Least privilege
Answers
C.
Password complexity
C.
Password complexity
Answers
D.
Non-disclosure agreement
D.
Non-disclosure agreement
Answers
Suggested answer: A
asked 18/09/2024
Tuan Nguyen
41 questions

Question 243

Report
Export
Collapse

Which of the following BEST describes Recovery Time Objective (RTO)?

A.
Time of data validation after disaster
A.
Time of data validation after disaster
Answers
B.
Time of data restoration from backup after disaster
B.
Time of data restoration from backup after disaster
Answers
C.
Time of application resumption after disaster
C.
Time of application resumption after disaster
Answers
D.
Time of application verification after disaster
D.
Time of application verification after disaster
Answers
Suggested answer: C
asked 18/09/2024
Mike Schatens
31 questions

Question 244

Report
Export
Collapse

An organization publishes and periodically updates its employee policies in a file on their intranet.

Which of the following is a PRIMARY security concern?

A.
Availability
A.
Availability
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Integrity
C.
Integrity
Answers
D.
Ownership
D.
Ownership
Answers
Suggested answer: A
asked 18/09/2024
Harry Vervelde
40 questions

Question 245

Report
Export
Collapse

An online retail company has formulated a record retention schedule for customer transactions.

Which of the following is a valid reason a customer transaction is kept beyond the retention schedule?

A.
Pending legal hold
A.
Pending legal hold
Answers
B.
Long term data mining needs
B.
Long term data mining needs
Answers
C.
Customer makes request to retain
C.
Customer makes request to retain
Answers
D.
Useful for future business initiatives
D.
Useful for future business initiatives
Answers
Suggested answer: A
asked 18/09/2024
Harold van den Meijdenberg
30 questions

Question 246

Report
Export
Collapse

Which of the following is the MAIN goal of a data retention policy?

A.
Ensure that data is destroyed properly.
A.
Ensure that data is destroyed properly.
Answers
B.
Ensure that data recovery can be done on the datA.
B.
Ensure that data recovery can be done on the datA.
Answers
C.
Ensure the integrity and availability of data for a predetermined amount of time.
C.
Ensure the integrity and availability of data for a predetermined amount of time.
Answers
D.
Ensure the integrity and confidentiality of data for a predetermined amount of time.
D.
Ensure the integrity and confidentiality of data for a predetermined amount of time.
Answers
Suggested answer: C
asked 18/09/2024
james campbell
38 questions

Question 247

Report
Export
Collapse

Which of the following problems is not addressed by using OAuth (Open Standard to Authorization) 2.0 to integrate a third-party identity provider for a service?

A.
Resource Servers are required to use passwords to authenticate end users.
A.
Resource Servers are required to use passwords to authenticate end users.
Answers
B.
Revocation of access of some users of the third party instead of all the users from the third party.
B.
Revocation of access of some users of the third party instead of all the users from the third party.
Answers
C.
Compromise of the third party means compromise of all the users in the service.
C.
Compromise of the third party means compromise of all the users in the service.
Answers
D.
Guest users need to authenticate with the third party identity provider.
D.
Guest users need to authenticate with the third party identity provider.
Answers
Suggested answer: A
asked 18/09/2024
Mark Arnold Santos
37 questions

Question 248

Report
Export
Collapse

The use of proximity card to gain access to a building is an example of what type of security control?

A.
Legal
A.
Legal
Answers
B.
Logical
B.
Logical
Answers
C.
Physical
C.
Physical
Answers
D.
Procedural
D.
Procedural
Answers
Suggested answer: C
asked 18/09/2024
Ryan Lee
27 questions

Question 249

Report
Export
Collapse

Multi-Factor Authentication (MFA) is necessary in many systems given common types of password attacks. Which of the following is a correct list of password attacks?

A.
Masquerading, salami, malware, polymorphism
A.
Masquerading, salami, malware, polymorphism
Answers
B.
Brute force, dictionary, phishing, keylogger
B.
Brute force, dictionary, phishing, keylogger
Answers
C.
Zeus, netbus, rabbit, turtle
C.
Zeus, netbus, rabbit, turtle
Answers
D.
Token, biometrics, IDS, DLP
D.
Token, biometrics, IDS, DLP
Answers
Suggested answer: B
asked 18/09/2024
Conceicao Damasceno
34 questions

Question 250

Report
Export
Collapse

Which of the following is an example of two-factor authentication?

A.
Retina scan and a palm print
A.
Retina scan and a palm print
Answers
B.
Fingerprint and a smart card
B.
Fingerprint and a smart card
Answers
C.
Magnetic stripe card and an ID badge
C.
Magnetic stripe card and an ID badge
Answers
D.
Password and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
D.
Password and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
Answers
Suggested answer: B
asked 18/09/2024
Susan Brady
47 questions
Total 1.482 questions
Go to page: of 149