ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 35

List of questions

Question 341

Report Export Collapse

A Simple Power Analysis (SPA) attack against a device directly observes which of the following?

Static discharge
Static discharge
Consumption
Consumption
Generation
Generation
Magnetism
Magnetism
Suggested answer: B
asked 18/09/2024
Andrew Staton
33 questions

Question 342

Report Export Collapse

Which of the following is an essential step before performing Structured Query Language (SQL) penetration tests on a production system?

Verify countermeasures have been deactivated.
Verify countermeasures have been deactivated.
Ensure firewall logging has been activated.
Ensure firewall logging has been activated.
Validate target systems have been backed up.
Validate target systems have been backed up.
Confirm warm site is ready to accept connections.
Confirm warm site is ready to accept connections.
Suggested answer: C
asked 18/09/2024
Mohammad Wahid
50 questions

Question 343

Report Export Collapse

Which of the following activities BEST identifies operational problems, security misconfigurations, and malicious attacks?

Policy documentation review
Policy documentation review
Authentication validation
Authentication validation
Periodic log reviews
Periodic log reviews
Interface testing
Interface testing
Suggested answer: C
asked 18/09/2024
Victor Cantu
41 questions

Question 344

Report Export Collapse

What is the GREATEST challenge of an agent-based patch management solution?

Time to gather vulnerability information about the computers in the program
Time to gather vulnerability information about the computers in the program
Requires that software be installed, running, and managed on all participating computers
Requires that software be installed, running, and managed on all participating computers
The significant amount of network bandwidth while scanning computers
The significant amount of network bandwidth while scanning computers
The consistency of distributing patches to each participating computer
The consistency of distributing patches to each participating computer
Suggested answer: B
asked 18/09/2024
B schatens
47 questions

Question 345

Report Export Collapse

Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that system and trigger a recertification activity are documented in the

security impact analysis.
security impact analysis.
structured code review.
structured code review.
routine self assessment.
routine self assessment.
cost benefit analysis.
cost benefit analysis.
Suggested answer: A
asked 18/09/2024
Jorge Andres Gutierrez
36 questions

Question 346

Report Export Collapse

Disaster Recovery Plan (DRP) training material should be

consistent so that all audiences receive the same training.
consistent so that all audiences receive the same training.
stored in a fire proof safe to ensure availability when needed.
stored in a fire proof safe to ensure availability when needed.
only delivered in paper format.
only delivered in paper format.
presented in a professional looking manner.
presented in a professional looking manner.
Suggested answer: A
asked 18/09/2024
bert toger
44 questions

Question 347

Report Export Collapse

The MAIN reason an organization conducts a security authorization process is to

force the organization to make conscious risk decisions.
force the organization to make conscious risk decisions.
assure the effectiveness of security controls.
assure the effectiveness of security controls.
assure the correct security organization exists.
assure the correct security organization exists.
force the organization to enlist management support.
force the organization to enlist management support.
Suggested answer: A
asked 18/09/2024
Amol Wani
48 questions

Question 348

Report Export Collapse

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

Document the system as high risk
Document the system as high risk
Perform a vulnerability assessment
Perform a vulnerability assessment
Perform a quantitative threat assessment
Perform a quantitative threat assessment
Notate the information and move on
Notate the information and move on
Suggested answer: B
asked 18/09/2024
Jumar Antonia
44 questions

Question 349

Report Export Collapse

The World Trade Organization's (WTO) agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) requires authors of computer software to be given the

right to refuse or permit commercial rentals.
right to refuse or permit commercial rentals.
right to disguise the software's geographic origin.
right to disguise the software's geographic origin.
ability to tailor security parameters based on location.
ability to tailor security parameters based on location.
ability to confirm license authenticity of their works.
ability to confirm license authenticity of their works.
Suggested answer: A
asked 18/09/2024
Kostiantyn Lazurenko
52 questions

Question 350

Report Export Collapse

What is the GREATEST challenge to identifying data leaks?

Available technical tools that enable user activity monitoring.
Available technical tools that enable user activity monitoring.
Documented asset classification policy and clear labeling of assets.
Documented asset classification policy and clear labeling of assets.
Senior management cooperation in investigating suspicious behavior.
Senior management cooperation in investigating suspicious behavior.
Law enforcement participation to apprehend and interrogate suspects.
Law enforcement participation to apprehend and interrogate suspects.
Suggested answer: B
asked 18/09/2024
Francisli Lilles
47 questions
Total 1.482 questions
Go to page: of 149