ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 47

List of questions

Question 461

Report Export Collapse

A security architect plans to reference a Mandatory Access Control (MAC) model for implementation.

This indicates that which of the following properties are being prioritized?

Confidentiality
Confidentiality
Integrity
Integrity
Availability
Availability
Accessibility
Accessibility
Suggested answer: C
asked 18/09/2024
Jered Anderson
47 questions

Question 462

Report Export Collapse

A vulnerability in which of the following components would be MOST difficult to detect?

Kernel
Kernel
Shared libraries
Shared libraries
Hardware
Hardware
System application
System application
Suggested answer: C
asked 18/09/2024
Jennifer Okai Addey
38 questions

Question 463

Report Export Collapse

During which of the following processes is least privilege implemented for a user account?

Provision
Provision
Approve
Approve
Request
Request
Review
Review
Suggested answer: A
asked 18/09/2024
Sheng-Feng Zhang
42 questions

Question 464

Report Export Collapse

Which of the following is a document that identifies each item seized in an investigation, including date and time seized, full name and signature or initials of the person who seized the item, and a detailed description of the item?

Property book
Property book
Chain of custody form
Chain of custody form
Search warrant return
Search warrant return
Evidence tag
Evidence tag
Suggested answer: D
asked 18/09/2024
Suman Konda
52 questions

Question 465

Report Export Collapse

Which of the following is needed to securely distribute symmetric cryptographic keys?

Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates
Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates
Officially approved and compliant key management technology and processes
Officially approved and compliant key management technology and processes
An organizationally approved communication protection policy and key management plan
An organizationally approved communication protection policy and key management plan
Hardware tokens that protect the user's private key.
Hardware tokens that protect the user's private key.
Suggested answer: C
asked 18/09/2024
Rick James
47 questions

Question 466

Report Export Collapse

Reciprocal backup site agreements are considered to be

a better alternative than the use of warm sites.
a better alternative than the use of warm sites.
difficult to test for complex systems.
difficult to test for complex systems.
easy to implement for similar types of organizations.
easy to implement for similar types of organizations.
easy to test and implement for complex systems.
easy to test and implement for complex systems.
Suggested answer: B
asked 18/09/2024
Thutcha sudjitjjoon
41 questions

Question 467

Report Export Collapse

In which identity management process is the subject's identity established?

Trust
Trust
Provisioning
Provisioning
Authorization
Authorization
Enrollment
Enrollment
Suggested answer: D
asked 18/09/2024
claudine Nguepnang
45 questions

Question 468

Report Export Collapse

In order to assure authenticity, which of the following are required?

Confidentiality and authentication
Confidentiality and authentication
Confidentiality and integrity
Confidentiality and integrity
Authentication and non-repudiation
Authentication and non-repudiation
Integrity and non-repudiation
Integrity and non-repudiation
Suggested answer: D
asked 18/09/2024
S Muchobor
42 questions

Question 469

Report Export Collapse

At which layer of the Open Systems Interconnect (OSI) model are the source and destination address for a datagram handled?

Transport Layer
Transport Layer
Data-Link Layer
Data-Link Layer
Network Layer
Network Layer
Application Layer
Application Layer
Suggested answer: C
asked 18/09/2024
Nathan Phelan
52 questions

Question 470

Report Export Collapse

An organization regularly conducts its own penetration tests. Which of the following scenarios MUST be covered for the test to be effective?

Third-party vendor with access to the system
Third-party vendor with access to the system
System administrator access compromised
System administrator access compromised
Internal attacker with access to the system
Internal attacker with access to the system
Internal user accidentally accessing data
Internal user accidentally accessing data
Suggested answer: B
asked 18/09/2024
Mercedes Gonzalez Riera
48 questions
Total 1.482 questions
Go to page: of 149