ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 3

Question list
Search
Search

What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?

A.
Implementation Phase
A.
Implementation Phase
Answers
B.
Initialization Phase
B.
Initialization Phase
Answers
C.
Cancellation Phase
C.
Cancellation Phase
Answers
D.
Issued Phase
D.
Issued Phase
Answers
Suggested answer: D

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?

A.
Common Vulnerabilities and Exposures (CVE)
A.
Common Vulnerabilities and Exposures (CVE)
Answers
B.
Common Vulnerability Scoring System (CVSS)
B.
Common Vulnerability Scoring System (CVSS)
Answers
C.
Asset Reporting Format (ARF)
C.
Asset Reporting Format (ARF)
Answers
D.
Open Vulnerability and Assessment Language (OVAL)
D.
Open Vulnerability and Assessment Language (OVAL)
Answers
Suggested answer: B

Who in the organization is accountable for classification of data information assets?

A.
Data owner
A.
Data owner
Answers
B.
Data architect
B.
Data architect
Answers
C.
Chief Information Security Officer (CISO)
C.
Chief Information Security Officer (CISO)
Answers
D.
Chief Information Officer (CIO)
D.
Chief Information Officer (CIO)
Answers
Suggested answer: A

The use of private and public encryption keys is fundamental in the implementation of which of the following?

A.
Diffie-Hellman algorithm
A.
Diffie-Hellman algorithm
Answers
B.
Secure Sockets Layer (SSL)
B.
Secure Sockets Layer (SSL)
Answers
C.
Advanced Encryption Standard (AES)
C.
Advanced Encryption Standard (AES)
Answers
D.
Message Digest 5 (MD5)
D.
Message Digest 5 (MD5)
Answers
Suggested answer: B

What is the purpose of an Internet Protocol (IP) spoofing attack?

A.
To send excessive amounts of data to a process, making it unpredictable
A.
To send excessive amounts of data to a process, making it unpredictable
Answers
B.
To intercept network traffic without authorization
B.
To intercept network traffic without authorization
Answers
C.
To disguise the destination address from a target's IP filtering devices
C.
To disguise the destination address from a target's IP filtering devices
Answers
D.
To convince a system that it is communicating with a known entity
D.
To convince a system that it is communicating with a known entity
Answers
Suggested answer: D

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

A.
Link layer
A.
Link layer
Answers
B.
Physical layer
B.
Physical layer
Answers
C.
Session layer
C.
Session layer
Answers
D.
Application layer
D.
Application layer
Answers
Suggested answer: D

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

A.
Transport layer
A.
Transport layer
Answers
B.
Application layer
B.
Application layer
Answers
C.
Network layer
C.
Network layer
Answers
D.
Session layer
D.
Session layer
Answers
Suggested answer: A

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

A.
Layer 2 Tunneling Protocol (L2TP)
A.
Layer 2 Tunneling Protocol (L2TP)
Answers
B.
Link Control Protocol (LCP)
B.
Link Control Protocol (LCP)
Answers
C.
Challenge Handshake Authentication Protocol (CHAP)
C.
Challenge Handshake Authentication Protocol (CHAP)
Answers
D.
Packet Transfer Protocol (PTP)
D.
Packet Transfer Protocol (PTP)
Answers
Suggested answer: B

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

A.
Packet filtering
A.
Packet filtering
Answers
B.
Port services filtering
B.
Port services filtering
Answers
C.
Content filtering
C.
Content filtering
Answers
D.
Application access control
D.
Application access control
Answers
Suggested answer: A

An external attacker has compromised an organization's network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker's ability to gain further information?

A.
Implement packet filtering on the network firewalls
A.
Implement packet filtering on the network firewalls
Answers
B.
Install Host Based Intrusion Detection Systems (HIDS)
B.
Install Host Based Intrusion Detection Systems (HIDS)
Answers
C.
Require strong authentication for administrators
C.
Require strong authentication for administrators
Answers
D.
Implement logical network segmentation at the switches
D.
Implement logical network segmentation at the switches
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149