ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?

Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken
Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken
Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability
Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability
Management teams will understand the testing objectives and reputational risk to the organization
Management teams will understand the testing objectives and reputational risk to the organization
Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels
Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels
Suggested answer: D
asked 18/09/2024
Aubrey Oliver Jr
38 questions

Question 42

Report Export Collapse

Which of the following could cause a Denial of Service (DoS) against an authentication system?

Encryption of audit logs
Encryption of audit logs
No archiving of audit logs
No archiving of audit logs
Hashing of audit logs
Hashing of audit logs
Remote access audit logs
Remote access audit logs
Suggested answer: D
asked 18/09/2024
hajar mechrany
36 questions

Question 43

Report Export Collapse

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

Absence of a Business Intelligence (BI) solution
Absence of a Business Intelligence (BI) solution
Inadequate cost modeling
Inadequate cost modeling
Improper deployment of the Service-Oriented Architecture (SOA)
Improper deployment of the Service-Oriented Architecture (SOA)
Insufficient Service Level Agreement (SLA)
Insufficient Service Level Agreement (SLA)
Suggested answer: D
asked 18/09/2024
Farah Fauzi
46 questions

Question 44

Report Export Collapse

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

Walkthrough
Walkthrough
Simulation
Simulation
Parallel
Parallel
White box
White box
Suggested answer: C
asked 18/09/2024
Aiko Abrassart
38 questions

Question 45

Report Export Collapse

What is the PRIMARY reason for implementing change management?

Certify and approve releases to the environment
Certify and approve releases to the environment
Provide version rollbacks for system changes
Provide version rollbacks for system changes
Ensure that all applications are approved
Ensure that all applications are approved
Ensure accountability for changes to the environment
Ensure accountability for changes to the environment
Suggested answer: D
asked 18/09/2024
Thomas Drilling
50 questions

Question 46

Report Export Collapse

Which of the following is a PRIMARY advantage of using a third-party identity service?

Consolidation of multiple providers
Consolidation of multiple providers
Directory synchronization
Directory synchronization
Web based logon
Web based logon
Automated account management
Automated account management
Suggested answer: D
asked 18/09/2024
Piyush Zope
43 questions

Question 47

Report Export Collapse

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?

Continuously without exception for all security controls
Continuously without exception for all security controls
Before and after each change of the control
Before and after each change of the control
At a rate concurrent with the volatility of the security control
At a rate concurrent with the volatility of the security control
Only during system implementation and decommissioning
Only during system implementation and decommissioning
Suggested answer: B
asked 18/09/2024
ENET SOLUTIONS LOGICOM
42 questions

Question 48

Report Export Collapse

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

Take the computer to a forensic lab
Take the computer to a forensic lab
Make a copy of the hard drive
Make a copy of the hard drive
Start documenting
Start documenting
Turn off the computer
Turn off the computer
Suggested answer: C
asked 18/09/2024
Camrin Schroyer
37 questions

Question 49

Report Export Collapse

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

Disable all unnecessary services
Disable all unnecessary services
Ensure chain of custody
Ensure chain of custody
Prepare another backup of the system
Prepare another backup of the system
Isolate the system from the network
Isolate the system from the network
Suggested answer: D
asked 18/09/2024
Phuong Pham
45 questions

Question 50

Report Export Collapse

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

Guaranteed recovery of all business functions
Guaranteed recovery of all business functions
Minimization of the need decision making during a crisis
Minimization of the need decision making during a crisis
Insurance against litigation following a disaster
Insurance against litigation following a disaster
Protection from loss of organization resources
Protection from loss of organization resources
Suggested answer: D
asked 18/09/2024
Felix Bourdier
52 questions
Total 1.482 questions
Go to page: of 149