ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 48

List of questions

Question 471

Report Export Collapse

A company was ranked as high in the following National Institute of Standards and Technology (NIST) functions: Protect, Detect, Respond and Recover. However, a low maturity grade was attributed to the Identify function. In which of the following the controls categories does this company need to improve when analyzing its processes individually?

Asset Management, Business Environment, Governance and Risk Assessment
Asset Management, Business Environment, Governance and Risk Assessment
Access Control, Awareness and Training, Data Security and Maintenance
Access Control, Awareness and Training, Data Security and Maintenance
Anomalies and Events, Security Continuous Monitoring and Detection Processes
Anomalies and Events, Security Continuous Monitoring and Detection Processes
Recovery Planning, Improvements and Communications
Recovery Planning, Improvements and Communications
Suggested answer: A
asked 18/09/2024
darren cain
35 questions

Question 472

Report Export Collapse

What is the difference between media marking and media labeling?

Media marking refers to the use of human-readable security attributes, while media labeling refers to the use of security attributes in internal data structures.
Media marking refers to the use of human-readable security attributes, while media labeling refers to the use of security attributes in internal data structures.
Media labeling refers to the use of human-readable security attributes, while media marking refers to the use of security attributes in internal data structures.
Media labeling refers to the use of human-readable security attributes, while media marking refers to the use of security attributes in internal data structures.
Media labeling refers to security attributes required by public policy/law, while media marking refers to security required by internal organizational policy.
Media labeling refers to security attributes required by public policy/law, while media marking refers to security required by internal organizational policy.
Media marking refers to security attributes required by public policy/law, while media labeling refers to security attributes required by internal organizational policy.
Media marking refers to security attributes required by public policy/law, while media labeling refers to security attributes required by internal organizational policy.
Suggested answer: D
asked 18/09/2024
Vanildo Pedro
44 questions

Question 473

Report Export Collapse

What balance MUST be considered when web application developers determine how informative application error messages should be constructed?

Risk versus benefit
Risk versus benefit
Availability versus auditability
Availability versus auditability
Confidentiality versus integrity
Confidentiality versus integrity
Performance versus user satisfaction
Performance versus user satisfaction
Suggested answer: A
asked 18/09/2024
San Min Oo
49 questions

Question 474

Report Export Collapse

What operations role is responsible for protecting the enterprise from corrupt or contaminated media?

Information security practitioner
Information security practitioner
Information librarian
Information librarian
Computer operator
Computer operator
Network administrator
Network administrator
Suggested answer: B
asked 18/09/2024
Yun-Ting Lo
43 questions

Question 475

Report Export Collapse

Which of the following is a characteristic of the initialization vector when using Data Encryption Standard (DES)?

It must be known to both sender and receiver.
It must be known to both sender and receiver.
It can be transmitted in the clear as a random number.
It can be transmitted in the clear as a random number.
It must be retained until the last block is transmitted.
It must be retained until the last block is transmitted.
It can be used to encrypt and decrypt information.
It can be used to encrypt and decrypt information.
Suggested answer: B
asked 18/09/2024
Priya Ketkar
42 questions

Question 476

Report Export Collapse

In general, servers that are facing the Internet should be placed in a demilitarized zone (DMZ). What is MAIN purpose of the DMZ?

Reduced risk to internal systems.
Reduced risk to internal systems.
Prepare the server for potential attacks.
Prepare the server for potential attacks.
Mitigate the risk associated with the exposed server.
Mitigate the risk associated with the exposed server.
Bypass the need for a firewall.
Bypass the need for a firewall.
Suggested answer: A
asked 18/09/2024
Mohamed Abdul Haq Mohamed Akram
52 questions

Question 477

Report Export Collapse

Network-based logging has which advantage over host-based logging when reviewing malicious activity about a victim machine?

Addresses and protocols of network-based logs are analyzed.
Addresses and protocols of network-based logs are analyzed.
Host-based system logging has files stored in multiple locations.
Host-based system logging has files stored in multiple locations.
Properly handled network-based logs may be more reliable and valid.
Properly handled network-based logs may be more reliable and valid.
Network-based systems cannot capture users logging into the console.
Network-based systems cannot capture users logging into the console.
Suggested answer: A
asked 18/09/2024
Camrin Schroyer
35 questions

Question 478

Report Export Collapse

Which of the following is the PRIMARY reason for employing physical security personnel at entry points in facilities where card access is in operation?

To verify that only employees have access to the facility.
To verify that only employees have access to the facility.
To identify present hazards requiring remediation.
To identify present hazards requiring remediation.
To monitor staff movement throughout the facility.
To monitor staff movement throughout the facility.
To provide a safe environment for employees.
To provide a safe environment for employees.
Suggested answer: D
asked 18/09/2024
Ray Savage
28 questions

Question 479

Report Export Collapse

Between which pair of Open System Interconnection (OSI) Reference Model layers are routers used as a communications device?

Transport and Session
Transport and Session
Data-Link and Transport
Data-Link and Transport
Network and Session
Network and Session
Physical and Data-Link
Physical and Data-Link
Suggested answer: B
asked 18/09/2024
Felix Maroto Roman
52 questions

Question 480

Report Export Collapse

Which type of security testing is being performed when an ethical hacker has no knowledge about the target system but the testing target is notified before the test?

Reversal
Reversal
Gray box
Gray box
Blind
Blind
White box
White box
Suggested answer: C
asked 18/09/2024
Igor Vasiliev
50 questions
Total 1.482 questions
Go to page: of 149
Search