ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 47

Question list
Search
Search

A security architect plans to reference a Mandatory Access Control (MAC) model for implementation.

This indicates that which of the following properties are being prioritized?

A.
Confidentiality
A.
Confidentiality
Answers
B.
Integrity
B.
Integrity
Answers
C.
Availability
C.
Availability
Answers
D.
Accessibility
D.
Accessibility
Answers
Suggested answer: C

A vulnerability in which of the following components would be MOST difficult to detect?

A.
Kernel
A.
Kernel
Answers
B.
Shared libraries
B.
Shared libraries
Answers
C.
Hardware
C.
Hardware
Answers
D.
System application
D.
System application
Answers
Suggested answer: C

During which of the following processes is least privilege implemented for a user account?

A.
Provision
A.
Provision
Answers
B.
Approve
B.
Approve
Answers
C.
Request
C.
Request
Answers
D.
Review
D.
Review
Answers
Suggested answer: A

Which of the following is a document that identifies each item seized in an investigation, including date and time seized, full name and signature or initials of the person who seized the item, and a detailed description of the item?

A.
Property book
A.
Property book
Answers
B.
Chain of custody form
B.
Chain of custody form
Answers
C.
Search warrant return
C.
Search warrant return
Answers
D.
Evidence tag
D.
Evidence tag
Answers
Suggested answer: D

Which of the following is needed to securely distribute symmetric cryptographic keys?

A.
Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates
A.
Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates
Answers
B.
Officially approved and compliant key management technology and processes
B.
Officially approved and compliant key management technology and processes
Answers
C.
An organizationally approved communication protection policy and key management plan
C.
An organizationally approved communication protection policy and key management plan
Answers
D.
Hardware tokens that protect the user's private key.
D.
Hardware tokens that protect the user's private key.
Answers
Suggested answer: C

Reciprocal backup site agreements are considered to be

A.
a better alternative than the use of warm sites.
A.
a better alternative than the use of warm sites.
Answers
B.
difficult to test for complex systems.
B.
difficult to test for complex systems.
Answers
C.
easy to implement for similar types of organizations.
C.
easy to implement for similar types of organizations.
Answers
D.
easy to test and implement for complex systems.
D.
easy to test and implement for complex systems.
Answers
Suggested answer: B

In which identity management process is the subject's identity established?

A.
Trust
A.
Trust
Answers
B.
Provisioning
B.
Provisioning
Answers
C.
Authorization
C.
Authorization
Answers
D.
Enrollment
D.
Enrollment
Answers
Suggested answer: D

In order to assure authenticity, which of the following are required?

A.
Confidentiality and authentication
A.
Confidentiality and authentication
Answers
B.
Confidentiality and integrity
B.
Confidentiality and integrity
Answers
C.
Authentication and non-repudiation
C.
Authentication and non-repudiation
Answers
D.
Integrity and non-repudiation
D.
Integrity and non-repudiation
Answers
Suggested answer: D

At which layer of the Open Systems Interconnect (OSI) model are the source and destination address for a datagram handled?

A.
Transport Layer
A.
Transport Layer
Answers
B.
Data-Link Layer
B.
Data-Link Layer
Answers
C.
Network Layer
C.
Network Layer
Answers
D.
Application Layer
D.
Application Layer
Answers
Suggested answer: C

An organization regularly conducts its own penetration tests. Which of the following scenarios MUST be covered for the test to be effective?

A.
Third-party vendor with access to the system
A.
Third-party vendor with access to the system
Answers
B.
System administrator access compromised
B.
System administrator access compromised
Answers
C.
Internal attacker with access to the system
C.
Internal attacker with access to the system
Answers
D.
Internal user accidentally accessing data
D.
Internal user accidentally accessing data
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149