ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 32

Add to Whishlist

List of questions

Question 311

Report Export Collapse

Which of the following is the MOST likely cause of a non-malicious data breach when the source of the data breach was an un-marked file cabinet containing sensitive documents?

Become a Premium Member for full access
  Unlock Premium Member

Question 312

Report Export Collapse

A security professional has been asked to evaluate the options for the location of a new data center within a multifloor building. Concerns for the data center include emanations and physical access controls.

Which of the following is the BEST location?

Become a Premium Member for full access
  Unlock Premium Member

Question 313

Report Export Collapse

Which of the following is the PRIMARY concern when using an Internet browser to access a cloudbased service?

Become a Premium Member for full access
  Unlock Premium Member

Question 314

Report Export Collapse

After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway.

The perpetrator guessed a username and brute forced the password to gain access. Which of the following BEST mitigates this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 315

Report Export Collapse

For an organization considering two-factor authentication for secure network access, which of the following is MOST secure?

Become a Premium Member for full access
  Unlock Premium Member

Question 316

Report Export Collapse

If an identification process using a biometric system detects a 100% match between a presented template and a stored template, what is the interpretation of this result?

Become a Premium Member for full access
  Unlock Premium Member

Question 317

Report Export Collapse

Regarding asset security and appropriate retention, which of the following INITIAL top three areas are important to focus on?

Become a Premium Member for full access
  Unlock Premium Member

Question 318

Report Export Collapse

Discretionary Access Control (DAC) is based on which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 319

Report Export Collapse

By carefully aligning the pins in the lock, which of the following defines the opening of a mechanical lock without the proper key?

Become a Premium Member for full access
  Unlock Premium Member

Question 320

Report Export Collapse

An organization has decided to contract with a cloud-based service provider to leverage their identity as a service offering. They will use Open Authentication (OAuth) 2.0 to authenticate external users to the organization's services.

As part of the authentication process, which of the following must the end user provide?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search