ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 35

Question list
Search
Search

A Simple Power Analysis (SPA) attack against a device directly observes which of the following?

A.
Static discharge
A.
Static discharge
Answers
B.
Consumption
B.
Consumption
Answers
C.
Generation
C.
Generation
Answers
D.
Magnetism
D.
Magnetism
Answers
Suggested answer: B

Which of the following is an essential step before performing Structured Query Language (SQL) penetration tests on a production system?

A.
Verify countermeasures have been deactivated.
A.
Verify countermeasures have been deactivated.
Answers
B.
Ensure firewall logging has been activated.
B.
Ensure firewall logging has been activated.
Answers
C.
Validate target systems have been backed up.
C.
Validate target systems have been backed up.
Answers
D.
Confirm warm site is ready to accept connections.
D.
Confirm warm site is ready to accept connections.
Answers
Suggested answer: C

Which of the following activities BEST identifies operational problems, security misconfigurations, and malicious attacks?

A.
Policy documentation review
A.
Policy documentation review
Answers
B.
Authentication validation
B.
Authentication validation
Answers
C.
Periodic log reviews
C.
Periodic log reviews
Answers
D.
Interface testing
D.
Interface testing
Answers
Suggested answer: C

What is the GREATEST challenge of an agent-based patch management solution?

A.
Time to gather vulnerability information about the computers in the program
A.
Time to gather vulnerability information about the computers in the program
Answers
B.
Requires that software be installed, running, and managed on all participating computers
B.
Requires that software be installed, running, and managed on all participating computers
Answers
C.
The significant amount of network bandwidth while scanning computers
C.
The significant amount of network bandwidth while scanning computers
Answers
D.
The consistency of distributing patches to each participating computer
D.
The consistency of distributing patches to each participating computer
Answers
Suggested answer: B

Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that system and trigger a recertification activity are documented in the

A.
security impact analysis.
A.
security impact analysis.
Answers
B.
structured code review.
B.
structured code review.
Answers
C.
routine self assessment.
C.
routine self assessment.
Answers
D.
cost benefit analysis.
D.
cost benefit analysis.
Answers
Suggested answer: A

Disaster Recovery Plan (DRP) training material should be

A.
consistent so that all audiences receive the same training.
A.
consistent so that all audiences receive the same training.
Answers
B.
stored in a fire proof safe to ensure availability when needed.
B.
stored in a fire proof safe to ensure availability when needed.
Answers
C.
only delivered in paper format.
C.
only delivered in paper format.
Answers
D.
presented in a professional looking manner.
D.
presented in a professional looking manner.
Answers
Suggested answer: A

The MAIN reason an organization conducts a security authorization process is to

A.
force the organization to make conscious risk decisions.
A.
force the organization to make conscious risk decisions.
Answers
B.
assure the effectiveness of security controls.
B.
assure the effectiveness of security controls.
Answers
C.
assure the correct security organization exists.
C.
assure the correct security organization exists.
Answers
D.
force the organization to enlist management support.
D.
force the organization to enlist management support.
Answers
Suggested answer: A

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant.

What is the best approach for the CISO?

A.
Document the system as high risk
A.
Document the system as high risk
Answers
B.
Perform a vulnerability assessment
B.
Perform a vulnerability assessment
Answers
C.
Perform a quantitative threat assessment
C.
Perform a quantitative threat assessment
Answers
D.
Notate the information and move on
D.
Notate the information and move on
Answers
Suggested answer: B

The World Trade Organization's (WTO) agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) requires authors of computer software to be given the

A.
right to refuse or permit commercial rentals.
A.
right to refuse or permit commercial rentals.
Answers
B.
right to disguise the software's geographic origin.
B.
right to disguise the software's geographic origin.
Answers
C.
ability to tailor security parameters based on location.
C.
ability to tailor security parameters based on location.
Answers
D.
ability to confirm license authenticity of their works.
D.
ability to confirm license authenticity of their works.
Answers
Suggested answer: A

What is the GREATEST challenge to identifying data leaks?

A.
Available technical tools that enable user activity monitoring.
A.
Available technical tools that enable user activity monitoring.
Answers
B.
Documented asset classification policy and clear labeling of assets.
B.
Documented asset classification policy and clear labeling of assets.
Answers
C.
Senior management cooperation in investigating suspicious behavior.
C.
Senior management cooperation in investigating suspicious behavior.
Answers
D.
Law enforcement participation to apprehend and interrogate suspects.
D.
Law enforcement participation to apprehend and interrogate suspects.
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149