ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 30

Add to Whishlist

List of questions

Question 291

Report Export Collapse

What component of a web application that stores the session state in a cookie can be bypassed by an attacker?

An initialization check
An initialization check
An identification check
An identification check
An authentication check
An authentication check
An authorization check
An authorization check
Suggested answer: C
asked 18/09/2024
Ibiyemi Araoye
48 questions

Question 292

Report Export Collapse

Which of the following is a MAJOR consideration in implementing a Voice over IP (VoIP) network?

Use of a unified messaging.
Use of a unified messaging.
Use of separation for the voice network.
Use of separation for the voice network.
Use of Network Access Control (NAC) on switches.
Use of Network Access Control (NAC) on switches.
Use of Request for Comments (RFC) 1918 addressing.
Use of Request for Comments (RFC) 1918 addressing.
Suggested answer: A
asked 18/09/2024
J.L.M. van Loo
52 questions

Question 293

Report Export Collapse

Host-Based Intrusion Protection (HIPS) systems are often deployed in monitoring or learning mode during their initial implementation. What is the objective of starting in this mode?

Automatically create exceptions for specific actions or files
Automatically create exceptions for specific actions or files
Determine which files are unsafe to access and blacklist them
Determine which files are unsafe to access and blacklist them
Automatically whitelist actions or files known to the system
Automatically whitelist actions or files known to the system
Build a baseline of normal or safe system events for review
Build a baseline of normal or safe system events for review
Suggested answer: D
asked 18/09/2024
George Mabry
55 questions

Question 294

Report Export Collapse

Which of the following describes the concept of a Single Sign -On (SSO) system?

Users are authenticated to one system at a time.
Users are authenticated to one system at a time.
Users are identified to multiple systems with several credentials.
Users are identified to multiple systems with several credentials.
Users are authenticated to multiple systems with one login.
Users are authenticated to multiple systems with one login.
Only one user is using the system at a time.
Only one user is using the system at a time.
Suggested answer: C
asked 18/09/2024
Mellisa Stroman
45 questions

Question 295

Report Export Collapse

What physical characteristic does a retinal scan biometric device measure?

The amount of light reflected by the retina
The amount of light reflected by the retina
The size, curvature, and shape of the retina
The size, curvature, and shape of the retina
The pattern of blood vessels at the back of the eye
The pattern of blood vessels at the back of the eye
The pattern of light receptors at the back of the eye
The pattern of light receptors at the back of the eye
Suggested answer: C
asked 18/09/2024
Chris Ngobili
42 questions

Question 296

Report Export Collapse

What does secure authentication with logging provide?

Become a Premium Member for full access
  Unlock Premium Member

Question 297

Report Export Collapse

Which of the following provides the minimum set of privileges required to perform a job function and restricts the user to a domain with the required privileges?

Become a Premium Member for full access
  Unlock Premium Member

Question 298

Report Export Collapse

Discretionary Access Control (DAC) restricts access according to

Become a Premium Member for full access
  Unlock Premium Member

Question 299

Report Export Collapse

Retaining system logs for six months or longer can be valuable for what activities?

Become a Premium Member for full access
  Unlock Premium Member

Question 300

Report Export Collapse

Which of the following statements is TRUE regarding value boundary analysis as a functional software testing technique?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149