ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 41

Add to Whishlist

List of questions

Question 401

Report Export Collapse

What is the PRIMARY goal for using Domain Name System Security Extensions (DNSSEC) to sign records?

Become a Premium Member for full access
  Unlock Premium Member

Question 402

Report Export Collapse

While inventorying storage equipment, it is found that there are unlabeled, disconnected, and powered off devices. Which of the following is the correct procedure for handling such equipment?

Become a Premium Member for full access
  Unlock Premium Member

Question 403

Report Export Collapse

The PRIMARY characteristic of a Distributed Denial of Service (DDoS) attack is that it

Become a Premium Member for full access
  Unlock Premium Member

Question 404

Report Export Collapse

Which of the following is generally indicative of a replay attack when dealing with biometric authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 405

Report Export Collapse

During a fingerprint verification process, which of the following is used to verify identity and authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 406

Report Export Collapse

The BEST example of the concept of "something that a user has" when providing an authorized user access to a computing system is

Become a Premium Member for full access
  Unlock Premium Member

Question 407

Report Export Collapse

A security professional is asked to provide a solution that restricts a bank teller to only perform a savings deposit transaction but allows a supervisor to perform corrections after the transaction.

Which of the following is the MOST effective solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 408

Report Export Collapse

Sensitive customer data is going to be added to a database. What is the MOST effective implementation for ensuring data privacy?

Become a Premium Member for full access
  Unlock Premium Member

Question 409

Report Export Collapse

Which of the following types of security testing is the MOST effective in providing a better indication of the everyday security challenges of an organization when performing a security risk assessment?

Become a Premium Member for full access
  Unlock Premium Member

Question 410

Report Export Collapse

What is the MOST effective method of testing custom application code?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search