ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 52

List of questions

Question 511

Report Export Collapse

Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?

System owner roles and responsibilities, data handling standards, storage and secure development lifecycle requirements
System owner roles and responsibilities, data handling standards, storage and secure development lifecycle requirements
Data stewardship roles, data handling and storage standards, data lifecycle requirements
Data stewardship roles, data handling and storage standards, data lifecycle requirements
Compliance office roles and responsibilities, classified material handling standards, storage system lifecycle requirements
Compliance office roles and responsibilities, classified material handling standards, storage system lifecycle requirements
System authorization roles and responsibilities, cloud computing standards, lifecycle requirements
System authorization roles and responsibilities, cloud computing standards, lifecycle requirements
Suggested answer: B
asked 18/09/2024
David Aghaegbuna
50 questions

Question 512

Report Export Collapse

When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

Log all activities associated with sensitive systems
Log all activities associated with sensitive systems
Provide links to security policies
Provide links to security policies
Confirm that confidentially agreements are signed
Confirm that confidentially agreements are signed
Employ strong access controls
Employ strong access controls
Suggested answer: D
asked 18/09/2024
jateen chibabhai
44 questions

Question 513

Report Export Collapse

Which of the following is the MOST appropriate action when reusing media that contains sensitive data?

Erase
Erase
Sanitize
Sanitize
Encrypt
Encrypt
Degauss
Degauss
Suggested answer: B
asked 18/09/2024
benakli rabah
29 questions

Question 514

Report Export Collapse

An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?

Diffle-Hellman (DH) algorithm
Diffle-Hellman (DH) algorithm
Elliptic Curve Cryptography (ECC) algorithm
Elliptic Curve Cryptography (ECC) algorithm
Digital Signature algorithm (DSA)
Digital Signature algorithm (DSA)
Rivest-Shamir-Adleman (RSA) algorithm
Rivest-Shamir-Adleman (RSA) algorithm
Suggested answer: D
asked 18/09/2024
Peter Keijer
43 questions

Question 515

Report Export Collapse

Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center?

Inert gas fire suppression system
Inert gas fire suppression system
Halon gas fire suppression system
Halon gas fire suppression system
Dry-pipe sprinklers
Dry-pipe sprinklers
Wet-pipe sprinklers
Wet-pipe sprinklers
Suggested answer: A
asked 18/09/2024
Stephen McMahon
37 questions

Question 516

Report Export Collapse

Unused space in a disk cluster is important in media analysis because it may contain which of the following?

Residual data that has not been overwritten
Residual data that has not been overwritten
Hidden viruses and Trojan horses
Hidden viruses and Trojan horses
Information about the File Allocation table (FAT)
Information about the File Allocation table (FAT)
Information about patches and upgrades to the system
Information about patches and upgrades to the system
Suggested answer: A
asked 18/09/2024
Jose Castillo
41 questions

Question 517

Report Export Collapse

A company seizes a mobile device suspected of being used in committing fraud. What would be the BEST method used by a forensic examiner to isolate the powered-on device from the network and preserve the evidence?

Put the device in airplane mode
Put the device in airplane mode
Suspend the account with the telecommunication provider
Suspend the account with the telecommunication provider
Remove the SIM card
Remove the SIM card
Turn the device off
Turn the device off
Suggested answer: A
asked 18/09/2024
Marcelo I Sotelo S
40 questions

Question 518

Report Export Collapse

Which of the following is MOST appropriate for protecting confidentially of data stored on a hard drive?

Triple Data Encryption Standard (3DES)
Triple Data Encryption Standard (3DES)
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Message Digest 5 (MD5)
Message Digest 5 (MD5)
Secure Hash Algorithm 2(SHA-2)
Secure Hash Algorithm 2(SHA-2)
Suggested answer: B
asked 18/09/2024
David Aghaegbuna
45 questions

Question 519

Report Export Collapse

Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS) attacks?

Use Software as a Service (SaaS)
Use Software as a Service (SaaS)
Whitelist input validation
Whitelist input validation
Require client certificates
Require client certificates
Validate data output
Validate data output
Suggested answer: B
asked 18/09/2024
Nagarajapandian T
35 questions

Question 520

Report Export Collapse

What is the MOST significant benefit of an application upgrade that replaces randomly generated session keys with certificate based encryption for communications with backend servers?

Non-repudiation
Non-repudiation
Efficiency
Efficiency
Confidentially
Confidentially
Privacy
Privacy
Suggested answer: A
asked 18/09/2024
Tim Baas
45 questions
Total 1.482 questions
Go to page: of 149
Search