ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 47

Question list
Search
Search

Question 461

Report
Export
Collapse

A security architect plans to reference a Mandatory Access Control (MAC) model for implementation.

This indicates that which of the following properties are being prioritized?

A.
Confidentiality
A.
Confidentiality
Answers
B.
Integrity
B.
Integrity
Answers
C.
Availability
C.
Availability
Answers
D.
Accessibility
D.
Accessibility
Answers
Suggested answer: C
asked 18/09/2024
Jered Anderson
40 questions

Question 462

Report
Export
Collapse

A vulnerability in which of the following components would be MOST difficult to detect?

A.
Kernel
A.
Kernel
Answers
B.
Shared libraries
B.
Shared libraries
Answers
C.
Hardware
C.
Hardware
Answers
D.
System application
D.
System application
Answers
Suggested answer: C
asked 18/09/2024
Jennifer Okai Addey
36 questions

Question 463

Report
Export
Collapse

During which of the following processes is least privilege implemented for a user account?

A.
Provision
A.
Provision
Answers
B.
Approve
B.
Approve
Answers
C.
Request
C.
Request
Answers
D.
Review
D.
Review
Answers
Suggested answer: A
asked 18/09/2024
Sheng-Feng Zhang
36 questions

Question 464

Report
Export
Collapse

Which of the following is a document that identifies each item seized in an investigation, including date and time seized, full name and signature or initials of the person who seized the item, and a detailed description of the item?

A.
Property book
A.
Property book
Answers
B.
Chain of custody form
B.
Chain of custody form
Answers
C.
Search warrant return
C.
Search warrant return
Answers
D.
Evidence tag
D.
Evidence tag
Answers
Suggested answer: D
asked 18/09/2024
Suman Konda
46 questions

Question 465

Report
Export
Collapse

Which of the following is needed to securely distribute symmetric cryptographic keys?

A.
Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates
A.
Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates
Answers
B.
Officially approved and compliant key management technology and processes
B.
Officially approved and compliant key management technology and processes
Answers
C.
An organizationally approved communication protection policy and key management plan
C.
An organizationally approved communication protection policy and key management plan
Answers
D.
Hardware tokens that protect the user's private key.
D.
Hardware tokens that protect the user's private key.
Answers
Suggested answer: C
asked 18/09/2024
Rick James
43 questions

Question 466

Report
Export
Collapse

Reciprocal backup site agreements are considered to be

A.
a better alternative than the use of warm sites.
A.
a better alternative than the use of warm sites.
Answers
B.
difficult to test for complex systems.
B.
difficult to test for complex systems.
Answers
C.
easy to implement for similar types of organizations.
C.
easy to implement for similar types of organizations.
Answers
D.
easy to test and implement for complex systems.
D.
easy to test and implement for complex systems.
Answers
Suggested answer: B
asked 18/09/2024
Thutcha sudjitjjoon
35 questions

Question 467

Report
Export
Collapse

In which identity management process is the subject's identity established?

A.
Trust
A.
Trust
Answers
B.
Provisioning
B.
Provisioning
Answers
C.
Authorization
C.
Authorization
Answers
D.
Enrollment
D.
Enrollment
Answers
Suggested answer: D
asked 18/09/2024
claudine Nguepnang
42 questions

Question 468

Report
Export
Collapse

In order to assure authenticity, which of the following are required?

A.
Confidentiality and authentication
A.
Confidentiality and authentication
Answers
B.
Confidentiality and integrity
B.
Confidentiality and integrity
Answers
C.
Authentication and non-repudiation
C.
Authentication and non-repudiation
Answers
D.
Integrity and non-repudiation
D.
Integrity and non-repudiation
Answers
Suggested answer: D
asked 18/09/2024
S Muchobor
37 questions

Question 469

Report
Export
Collapse

At which layer of the Open Systems Interconnect (OSI) model are the source and destination address for a datagram handled?

A.
Transport Layer
A.
Transport Layer
Answers
B.
Data-Link Layer
B.
Data-Link Layer
Answers
C.
Network Layer
C.
Network Layer
Answers
D.
Application Layer
D.
Application Layer
Answers
Suggested answer: C
asked 18/09/2024
Nathan Phelan
48 questions

Question 470

Report
Export
Collapse

An organization regularly conducts its own penetration tests. Which of the following scenarios MUST be covered for the test to be effective?

A.
Third-party vendor with access to the system
A.
Third-party vendor with access to the system
Answers
B.
System administrator access compromised
B.
System administrator access compromised
Answers
C.
Internal attacker with access to the system
C.
Internal attacker with access to the system
Answers
D.
Internal user accidentally accessing data
D.
Internal user accidentally accessing data
Answers
Suggested answer: B
asked 18/09/2024
Mercedes Gonzalez Riera
39 questions
Total 1.482 questions
Go to page: of 149