ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 49

List of questions

Question 481

Report Export Collapse

Which of the following countermeasures is the MOST effective in defending against a social engineering attack?

Mandating security policy acceptance
Mandating security policy acceptance
Changing individual behavior
Changing individual behavior
Evaluating security awareness training
Evaluating security awareness training
Filtering malicious e-mail content
Filtering malicious e-mail content
Suggested answer: C
asked 18/09/2024
Joshua Paffen
33 questions

Question 482

Report Export Collapse

Which of the following information MUST be provided for user account provisioning?

Full name
Full name
Unique identifier
Unique identifier
Security question
Security question
Date of birth
Date of birth
Suggested answer: B
asked 18/09/2024
Arun kumar
41 questions

Question 483

Report Export Collapse

Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?

Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP)
Secure Hash Algorithm (SHA)
Secure Hash Algorithm (SHA)
Secure Shell (SSH)
Secure Shell (SSH)
Transport Layer Security (TLS)
Transport Layer Security (TLS)
Suggested answer: B
asked 18/09/2024
Foo goo
47 questions

Question 484

Report Export Collapse

A company has decided that they need to begin maintaining assets deployed in the enterprise. What approach should be followed to determine and maintain ownership information to bring the company into compliance?

Enterprise asset management framework
Enterprise asset management framework
Asset baseline using commercial off the shelf software
Asset baseline using commercial off the shelf software
Asset ownership database using domain login records
Asset ownership database using domain login records
A script to report active user logins on assets
A script to report active user logins on assets
Suggested answer: A
Explanation:
asked 18/09/2024
Luis Alfonso Rodriguez Castro
39 questions

Question 485

Report Export Collapse

In the Software Development Life Cycle (SDLC), maintaining accurate hardware and software inventories is a critical part of

systems integration.
systems integration.
risk management.
risk management.
quality assurance.
quality assurance.
change management.
change management.
Suggested answer: D
asked 18/09/2024
Jaimie Lloyd
43 questions

Question 486

Report Export Collapse

As a best practice, the Security Assessment Report (SAR) should include which of the following sections?

Data classification policy
Data classification policy
Software and hardware inventory
Software and hardware inventory
Remediation recommendations
Remediation recommendations
Names of participants
Names of participants
Suggested answer: B
asked 18/09/2024
Ash Eller
44 questions

Question 487

Report Export Collapse

The application of a security patch to a product previously validate at Common Criteria (CC) Evaluation Assurance Level (EAL) 4 would

require an update of the Protection Profile (PP).
require an update of the Protection Profile (PP).
require recertification.
require recertification.
retain its current EAL rating.
retain its current EAL rating.
reduce the product to EAL 3.
reduce the product to EAL 3.
Suggested answer: B
asked 18/09/2024
xingrui li
40 questions

Question 488

Report Export Collapse

Which of the following media sanitization techniques is MOST likely to be effective for an organization using public cloud services?

Low-level formatting
Low-level formatting
Secure-grade overwrite erasure
Secure-grade overwrite erasure
Cryptographic erasure
Cryptographic erasure
Drive degaussing
Drive degaussing
Suggested answer: B
asked 18/09/2024
Phil Horikawa
42 questions

Question 489

Report Export Collapse

What type of wireless network attack BEST describes an Electromagnetic Pulse (EMP) attack?

Radio Frequency (RF) attack
Radio Frequency (RF) attack
Denial of Service (DoS) attack
Denial of Service (DoS) attack
Data modification attack
Data modification attack
Application-layer attack
Application-layer attack
Suggested answer: B
asked 18/09/2024
Angela Stevens
64 questions

Question 490

Report Export Collapse

Which of the following is a remote access protocol that uses a static authentication?

Point-to-Point Tunneling Protocol (PPTP)
Point-to-Point Tunneling Protocol (PPTP)
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
Password Authentication Protocol (PAP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Challenge Handshake Authentication Protocol (CHAP)
Suggested answer: C
asked 18/09/2024
Ali Reza Azmi
51 questions
Total 1.482 questions
Go to page: of 149