ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 42

Question list
Search
Search

Which one of the following is a common risk with network configuration management?

A.
Patches on the network are difficult to keep current.
A.
Patches on the network are difficult to keep current.
Answers
B.
It is the responsibility of the systems administrator.
B.
It is the responsibility of the systems administrator.
Answers
C.
User ID and passwords are never set to expire.
C.
User ID and passwords are never set to expire.
Answers
D.
Network diagrams are not up to date.
D.
Network diagrams are not up to date.
Answers
Suggested answer: D

What type of test assesses a Disaster Recovery (DR) plan using realistic disaster scenarios while maintaining minimal impact to business operations?

A.
Parallel
A.
Parallel
Answers
B.
Walkthrough
B.
Walkthrough
Answers
C.
Simulation
C.
Simulation
Answers
D.
Tabletop
D.
Tabletop
Answers
Suggested answer: C

How can lessons learned from business continuity training and actual recovery incidents BEST be used?

A.
As a means for improvement
A.
As a means for improvement
Answers
B.
As alternative options for awareness and training
B.
As alternative options for awareness and training
Answers
C.
As indicators of a need for policy
C.
As indicators of a need for policy
Answers
D.
As business function gap indicators
D.
As business function gap indicators
Answers
Suggested answer: A

An Intrusion Detection System (IDS) has recently been deployed in a Demilitarized Zone (DMZ). The IDS detects a flood of malformed packets. Which of the following BEST describes what has occurred?

A.
Denial of Service (DoS) attack
A.
Denial of Service (DoS) attack
Answers
B.
Address Resolution Protocol (ARP) spoof
B.
Address Resolution Protocol (ARP) spoof
Answers
C.
Buffer overflow
C.
Buffer overflow
Answers
D.
Ping flood attack
D.
Ping flood attack
Answers
Suggested answer: A

In configuration management, what baseline configuration information MUST be maintained for each computer system?

A.
Operating system and version, patch level, applications running, and versions.
A.
Operating system and version, patch level, applications running, and versions.
Answers
B.
List of system changes, test reports, and change approvals
B.
List of system changes, test reports, and change approvals
Answers
C.
Last vulnerability assessment report and initial risk assessment report
C.
Last vulnerability assessment report and initial risk assessment report
Answers
D.
Date of last update, test report, and accreditation certificate
D.
Date of last update, test report, and accreditation certificate
Answers
Suggested answer: A

Which Radio Frequency Interference (RFI) phenomenon associated with bundled cable runs can create information leakage?

A.
Transference
A.
Transference
Answers
B.
Covert channel
B.
Covert channel
Answers
C.
Bleeding
C.
Bleeding
Answers
D.
Cross-talk
D.
Cross-talk
Answers
Suggested answer: D

An organization's information security strategic plan MUST be reviewed

A.
whenever there are significant changes to a major application.
A.
whenever there are significant changes to a major application.
Answers
B.
quarterly, when the organization's strategic plan is updated.
B.
quarterly, when the organization's strategic plan is updated.
Answers
C.
whenever there are major changes to the business.
C.
whenever there are major changes to the business.
Answers
D.
every three years, when the organization's strategic plan is updated.
D.
every three years, when the organization's strategic plan is updated.
Answers
Suggested answer: C

When building a data classification scheme, which of the following is the PRIMARY concern?

A.
Purpose
A.
Purpose
Answers
B.
Cost effectiveness
B.
Cost effectiveness
Answers
C.
Availability
C.
Availability
Answers
D.
Authenticity
D.
Authenticity
Answers
Suggested answer: D

Which technology is a prerequisite for populating the cloud-based directory in a federated identity solution?

A.
Notification tool
A.
Notification tool
Answers
B.
Message queuing tool
B.
Message queuing tool
Answers
C.
Security token tool
C.
Security token tool
Answers
D.
Synchronization tool
D.
Synchronization tool
Answers
Suggested answer: C

What is an advantage of Elliptic Curve Cryptography (ECC)?

A.
Cryptographic approach that does not require a fixed-length key
A.
Cryptographic approach that does not require a fixed-length key
Answers
B.
Military-strength security that does not depend upon secrecy of the algorithm
B.
Military-strength security that does not depend upon secrecy of the algorithm
Answers
C.
Opportunity to use shorter keys for the same level of security
C.
Opportunity to use shorter keys for the same level of security
Answers
D.
Ability to use much longer keys for greater security
D.
Ability to use much longer keys for greater security
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149