ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 28

List of questions

Question 271

Report Export Collapse

Refer to the information below to answer the question.

During the investigation of a security incident, it is determined that an unauthorized individual accessed a system which hosts a database containing financial information.

If the intrusion causes the system processes to hang, which of the following has been affected?

System integrity
System integrity
System availability
System availability
System confidentiality
System confidentiality
System auditability
System auditability
Suggested answer: B
asked 18/09/2024
Chaston Williams
34 questions

Question 272

Report Export Collapse

Refer to the information below to answer the question.

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles.

Which of the following will be the PRIMARY security concern as staff is released from the organization?

Inadequate IT support
Inadequate IT support
Loss of data and separation of duties
Loss of data and separation of duties
Undocumented security controls
Undocumented security controls
Additional responsibilities for remaining staff
Additional responsibilities for remaining staff
Suggested answer: B
asked 18/09/2024
Kanta Prasad
42 questions

Question 273

Report Export Collapse

Refer to the information below to answer the question.

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles.

Which of the following will MOST likely allow the organization to keep risk at an acceptable level?

Increasing the amount of audits performed by third parties
Increasing the amount of audits performed by third parties
Removing privileged accounts from operational staff
Removing privileged accounts from operational staff
Assigning privileged functions to appropriate staff
Assigning privileged functions to appropriate staff
Separating the security function into distinct roles
Separating the security function into distinct roles
Suggested answer: C
asked 18/09/2024
Ludovic HEZON
34 questions

Question 274

Report Export Collapse

Refer to the information below to answer the question.

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles.

Which of the following will indicate where the IT budget is BEST allocated during this time?

Policies
Policies
Frameworks
Frameworks
Metrics
Metrics
Guidelines
Guidelines
Suggested answer: C
asked 18/09/2024
EDUARDO LEE
44 questions

Question 275

Report Export Collapse

Refer to the information below to answer the question.

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles.

When determining appropriate resource allocation, which of the following is MOST important to monitor?

Number of system compromises
Number of system compromises
Number of audit findings
Number of audit findings
Number of staff reductions
Number of staff reductions
Number of additional assets
Number of additional assets
Suggested answer: B
asked 18/09/2024
Ben Johnson
40 questions

Question 276

Report Export Collapse

Refer to the information below to answer the question.

In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.

ISC CISSP image Question 276 46141 09182024210516000000

Which of the following is true according to the star property (*property)?

User D can write to File 1
User D can write to File 1
User B can write to File 1
User B can write to File 1
User A can write to File 1
User A can write to File 1
User C can write to File 1
User C can write to File 1
Suggested answer: C
asked 18/09/2024
Kevin Brigitta
31 questions

Question 277

Report Export Collapse

Refer to the information below to answer the question.

In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.

ISC CISSP image Question 277 46142 09182024210516000000

In a Bell-LaPadula system, which user cannot write to File 3?

User A
User A
User B
User B
User C
User C
User D
User D
Suggested answer: D
asked 18/09/2024
Jack de Cort
43 questions

Question 278

Report Export Collapse

Refer to the information below to answer the question.

In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files.

ISC CISSP image Question 278 46143 09182024210516000000

In a Bell-LaPadula system, which user has the MOST restrictions when writing data to any of the four files?

User A
User A
User B
User B
User C
User C
User D
User D
Suggested answer: D
asked 18/09/2024
claudine Nguepnang
47 questions

Question 279

Report Export Collapse

Refer to the information below to answer the question.

Desktop computers in an organization were sanitized for re-use in an equivalent security environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data that was formerly stored on the magnetic drives were removed.

After magnetic drives were degaussed twice according to the product manufacturer's directions, what is the MOST LIKELY security issue with degaussing?

Commercial products often have serious weaknesses of the magnetic force available in the degausser product.
Commercial products often have serious weaknesses of the magnetic force available in the degausser product.
Degausser products may not be properly maintained and operated.
Degausser products may not be properly maintained and operated.
The inability to turn the drive around in the chamber for the second pass due to human error.
The inability to turn the drive around in the chamber for the second pass due to human error.
Inadequate record keeping when sanitizing mediA.
Inadequate record keeping when sanitizing mediA.
Suggested answer: B
asked 18/09/2024
David Hartnett
51 questions

Question 280

Report Export Collapse

Refer to the information below to answer the question.

Desktop computers in an organization were sanitized for re-use in an equivalent security environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data that was formerly stored on the magnetic drives were removed.

Organizational policy requires the deletion of user data from Personal Digital Assistant (PDA) devices before disposal. It may not be possible to delete the user data if the device is malfunctioning. Which destruction method below provides the BEST assurance that the data has been removed?

Knurling
Knurling
Grinding
Grinding
Shredding
Shredding
Degaussing
Degaussing
Suggested answer: C
asked 18/09/2024
Manuel Ortega
48 questions
Total 1.482 questions
Go to page: of 149
Search