ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 45

Question list
Search
Search

Which of the following is BEST suited for exchanging authentication and authorization messages in a multi-party decentralized environment?

A.
Lightweight Directory Access Protocol (LDAP)
A.
Lightweight Directory Access Protocol (LDAP)
Answers
B.
Security Assertion Markup Language (SAML)
B.
Security Assertion Markup Language (SAML)
Answers
C.
Internet Mail Access Protocol
C.
Internet Mail Access Protocol
Answers
D.
Transport Layer Security (TLS)
D.
Transport Layer Security (TLS)
Answers
Suggested answer: B

Which of the following is MOST important when deploying digital certificates?

A.
Validate compliance with X.509 digital certificate standards
A.
Validate compliance with X.509 digital certificate standards
Answers
B.
Establish a certificate life cycle management framework
B.
Establish a certificate life cycle management framework
Answers
C.
Use a third-party Certificate Authority (CA)
C.
Use a third-party Certificate Authority (CA)
Answers
D.
Use no less than 256-bit strength encryption when creating a certificate
D.
Use no less than 256-bit strength encryption when creating a certificate
Answers
Suggested answer: B

A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach that the administrator should take?

A.
Administrator should request data owner approval to the user access
A.
Administrator should request data owner approval to the user access
Answers
B.
Administrator should request manager approval for the user access
B.
Administrator should request manager approval for the user access
Answers
C.
Administrator should directly grant the access to the non-sensitive files
C.
Administrator should directly grant the access to the non-sensitive files
Answers
D.
Administrator should assess the user access need and either grant or deny the access
D.
Administrator should assess the user access need and either grant or deny the access
Answers
Suggested answer: A

How should an organization determine the priority of its remediation efforts after a vulnerability assessment has been conducted?

A.
Use an impact-based approach.
A.
Use an impact-based approach.
Answers
B.
Use a risk-based approach.
B.
Use a risk-based approach.
Answers
C.
Use a criticality-based approach.
C.
Use a criticality-based approach.
Answers
D.
Use a threat-based approach.
D.
Use a threat-based approach.
Answers
Suggested answer: B

Which of the following is the MOST important consideration when developing a Disaster Recovery Plan (DRP)?

A.
The dynamic reconfiguration of systems
A.
The dynamic reconfiguration of systems
Answers
B.
The cost of downtime
B.
The cost of downtime
Answers
C.
A recovery strategy for all business processes
C.
A recovery strategy for all business processes
Answers
D.
A containment strategy
D.
A containment strategy
Answers
Suggested answer: C

A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?

A.
Transport
A.
Transport
Answers
B.
Data link
B.
Data link
Answers
C.
Network
C.
Network
Answers
D.
Application
D.
Application
Answers
Suggested answer: D

Which of the following restricts the ability of an individual to carry out all the steps of a particular process?

A.
Job rotation
A.
Job rotation
Answers
B.
Separation of duties
B.
Separation of duties
Answers
C.
Least privilege
C.
Least privilege
Answers
D.
Mandatory vacations
D.
Mandatory vacations
Answers
Suggested answer: B

Although code using a specific program language may not be susceptible to a buffer overflow attack,

A.
most calls to plug-in programs are susceptible.
A.
most calls to plug-in programs are susceptible.
Answers
B.
most supporting application code is susceptible.
B.
most supporting application code is susceptible.
Answers
C.
the graphical images used by the application could be susceptible.
C.
the graphical images used by the application could be susceptible.
Answers
D.
the supporting virtual machine could be susceptible.
D.
the supporting virtual machine could be susceptible.
Answers
Suggested answer: C

What is the BEST way to encrypt web application communications?

A.
Secure Hash Algorithm 1 (SHA-1)
A.
Secure Hash Algorithm 1 (SHA-1)
Answers
B.
Secure Sockets Layer (SSL)
B.
Secure Sockets Layer (SSL)
Answers
C.
Cipher Block Chaining Message Authentication Code (CBC-MAC)
C.
Cipher Block Chaining Message Authentication Code (CBC-MAC)
Answers
D.
Transport Layer Security (TLS)
D.
Transport Layer Security (TLS)
Answers
Suggested answer: D

Which of the following are effective countermeasures against passive network-layer attacks?

A.
Federated security and authenticated access controls
A.
Federated security and authenticated access controls
Answers
B.
Trusted software development and run time integrity controls
B.
Trusted software development and run time integrity controls
Answers
C.
Encryption and security enabled applications
C.
Encryption and security enabled applications
Answers
D.
Enclave boundary protection and computing environment defense
D.
Enclave boundary protection and computing environment defense
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149