ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 5

Question list
Search
Search

Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?

A.
Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken
A.
Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken
Answers
B.
Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability
B.
Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability
Answers
C.
Management teams will understand the testing objectives and reputational risk to the organization
C.
Management teams will understand the testing objectives and reputational risk to the organization
Answers
D.
Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels
D.
Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels
Answers
Suggested answer: D

Which of the following could cause a Denial of Service (DoS) against an authentication system?

A.
Encryption of audit logs
A.
Encryption of audit logs
Answers
B.
No archiving of audit logs
B.
No archiving of audit logs
Answers
C.
Hashing of audit logs
C.
Hashing of audit logs
Answers
D.
Remote access audit logs
D.
Remote access audit logs
Answers
Suggested answer: D

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

A.
Absence of a Business Intelligence (BI) solution
A.
Absence of a Business Intelligence (BI) solution
Answers
B.
Inadequate cost modeling
B.
Inadequate cost modeling
Answers
C.
Improper deployment of the Service-Oriented Architecture (SOA)
C.
Improper deployment of the Service-Oriented Architecture (SOA)
Answers
D.
Insufficient Service Level Agreement (SLA)
D.
Insufficient Service Level Agreement (SLA)
Answers
Suggested answer: D

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

A.
Walkthrough
A.
Walkthrough
Answers
B.
Simulation
B.
Simulation
Answers
C.
Parallel
C.
Parallel
Answers
D.
White box
D.
White box
Answers
Suggested answer: C

What is the PRIMARY reason for implementing change management?

A.
Certify and approve releases to the environment
A.
Certify and approve releases to the environment
Answers
B.
Provide version rollbacks for system changes
B.
Provide version rollbacks for system changes
Answers
C.
Ensure that all applications are approved
C.
Ensure that all applications are approved
Answers
D.
Ensure accountability for changes to the environment
D.
Ensure accountability for changes to the environment
Answers
Suggested answer: D

Which of the following is a PRIMARY advantage of using a third-party identity service?

A.
Consolidation of multiple providers
A.
Consolidation of multiple providers
Answers
B.
Directory synchronization
B.
Directory synchronization
Answers
C.
Web based logon
C.
Web based logon
Answers
D.
Automated account management
D.
Automated account management
Answers
Suggested answer: D

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?

A.
Continuously without exception for all security controls
A.
Continuously without exception for all security controls
Answers
B.
Before and after each change of the control
B.
Before and after each change of the control
Answers
C.
At a rate concurrent with the volatility of the security control
C.
At a rate concurrent with the volatility of the security control
Answers
D.
Only during system implementation and decommissioning
D.
Only during system implementation and decommissioning
Answers
Suggested answer: B

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

A.
Take the computer to a forensic lab
A.
Take the computer to a forensic lab
Answers
B.
Make a copy of the hard drive
B.
Make a copy of the hard drive
Answers
C.
Start documenting
C.
Start documenting
Answers
D.
Turn off the computer
D.
Turn off the computer
Answers
Suggested answer: C

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

A.
Disable all unnecessary services
A.
Disable all unnecessary services
Answers
B.
Ensure chain of custody
B.
Ensure chain of custody
Answers
C.
Prepare another backup of the system
C.
Prepare another backup of the system
Answers
D.
Isolate the system from the network
D.
Isolate the system from the network
Answers
Suggested answer: D

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

A.
Guaranteed recovery of all business functions
A.
Guaranteed recovery of all business functions
Answers
B.
Minimization of the need decision making during a crisis
B.
Minimization of the need decision making during a crisis
Answers
C.
Insurance against litigation following a disaster
C.
Insurance against litigation following a disaster
Answers
D.
Protection from loss of organization resources
D.
Protection from loss of organization resources
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149