ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 49

Question list
Search
Search

Which of the following countermeasures is the MOST effective in defending against a social engineering attack?

A.
Mandating security policy acceptance
A.
Mandating security policy acceptance
Answers
B.
Changing individual behavior
B.
Changing individual behavior
Answers
C.
Evaluating security awareness training
C.
Evaluating security awareness training
Answers
D.
Filtering malicious e-mail content
D.
Filtering malicious e-mail content
Answers
Suggested answer: C

Which of the following information MUST be provided for user account provisioning?

A.
Full name
A.
Full name
Answers
B.
Unique identifier
B.
Unique identifier
Answers
C.
Security question
C.
Security question
Answers
D.
Date of birth
D.
Date of birth
Answers
Suggested answer: B

Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?

A.
Temporal Key Integrity Protocol (TKIP)
A.
Temporal Key Integrity Protocol (TKIP)
Answers
B.
Secure Hash Algorithm (SHA)
B.
Secure Hash Algorithm (SHA)
Answers
C.
Secure Shell (SSH)
C.
Secure Shell (SSH)
Answers
D.
Transport Layer Security (TLS)
D.
Transport Layer Security (TLS)
Answers
Suggested answer: B

A company has decided that they need to begin maintaining assets deployed in the enterprise. What approach should be followed to determine and maintain ownership information to bring the company into compliance?

A.
Enterprise asset management framework
A.
Enterprise asset management framework
Answers
B.
Asset baseline using commercial off the shelf software
B.
Asset baseline using commercial off the shelf software
Answers
C.
Asset ownership database using domain login records
C.
Asset ownership database using domain login records
Answers
D.
A script to report active user logins on assets
D.
A script to report active user logins on assets
Answers
Suggested answer: A

Explanation:

In the Software Development Life Cycle (SDLC), maintaining accurate hardware and software inventories is a critical part of

A.
systems integration.
A.
systems integration.
Answers
B.
risk management.
B.
risk management.
Answers
C.
quality assurance.
C.
quality assurance.
Answers
D.
change management.
D.
change management.
Answers
Suggested answer: D

As a best practice, the Security Assessment Report (SAR) should include which of the following sections?

A.
Data classification policy
A.
Data classification policy
Answers
B.
Software and hardware inventory
B.
Software and hardware inventory
Answers
C.
Remediation recommendations
C.
Remediation recommendations
Answers
D.
Names of participants
D.
Names of participants
Answers
Suggested answer: B

The application of a security patch to a product previously validate at Common Criteria (CC) Evaluation Assurance Level (EAL) 4 would

A.
require an update of the Protection Profile (PP).
A.
require an update of the Protection Profile (PP).
Answers
B.
require recertification.
B.
require recertification.
Answers
C.
retain its current EAL rating.
C.
retain its current EAL rating.
Answers
D.
reduce the product to EAL 3.
D.
reduce the product to EAL 3.
Answers
Suggested answer: B

Which of the following media sanitization techniques is MOST likely to be effective for an organization using public cloud services?

A.
Low-level formatting
A.
Low-level formatting
Answers
B.
Secure-grade overwrite erasure
B.
Secure-grade overwrite erasure
Answers
C.
Cryptographic erasure
C.
Cryptographic erasure
Answers
D.
Drive degaussing
D.
Drive degaussing
Answers
Suggested answer: B

What type of wireless network attack BEST describes an Electromagnetic Pulse (EMP) attack?

A.
Radio Frequency (RF) attack
A.
Radio Frequency (RF) attack
Answers
B.
Denial of Service (DoS) attack
B.
Denial of Service (DoS) attack
Answers
C.
Data modification attack
C.
Data modification attack
Answers
D.
Application-layer attack
D.
Application-layer attack
Answers
Suggested answer: B

Which of the following is a remote access protocol that uses a static authentication?

A.
Point-to-Point Tunneling Protocol (PPTP)
A.
Point-to-Point Tunneling Protocol (PPTP)
Answers
B.
Routing Information Protocol (RIP)
B.
Routing Information Protocol (RIP)
Answers
C.
Password Authentication Protocol (PAP)
C.
Password Authentication Protocol (PAP)
Answers
D.
Challenge Handshake Authentication Protocol (CHAP)
D.
Challenge Handshake Authentication Protocol (CHAP)
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149