ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 53

List of questions

Question 521

Report Export Collapse

A user has infected a computer with malware by connecting a Universal Serial Bus (USB) storage device.

Which of the following is MOST effective to mitigate future infections?

Develop a written organizational policy prohibiting unauthorized USB devices
Develop a written organizational policy prohibiting unauthorized USB devices
Train users on the dangers of transferring data in USB devices
Train users on the dangers of transferring data in USB devices
Implement centralized technical control of USB port connections
Implement centralized technical control of USB port connections
Encrypt removable USB devices containing data at rest
Encrypt removable USB devices containing data at rest
Suggested answer: C
asked 18/09/2024
Bob Hanselman
45 questions

Question 522

Report Export Collapse

Which of the following MUST be in place to recognize a system attack?

Stateful firewall
Stateful firewall
Distributed antivirus
Distributed antivirus
Log analysis
Log analysis
Passive honeypot
Passive honeypot
Suggested answer: C
asked 18/09/2024
Cesar Castillo
48 questions

Question 523

Report Export Collapse

Which of the following is the GREATEST benefit of implementing a Role Based Access Control (RBAC) system?

Integration using Lightweight Directory Access Protocol (LDAP)
Integration using Lightweight Directory Access Protocol (LDAP)
Form-based user registration process
Form-based user registration process
Integration with the organizations Human Resources (HR) system
Integration with the organizations Human Resources (HR) system
A considerably simpler provisioning process
A considerably simpler provisioning process
Suggested answer: D
asked 18/09/2024
Brent Kehoe
38 questions

Question 524

Report Export Collapse

Which Identity and Access Management (IAM) process can be used to maintain the principle of least privilege?

identity provisioning
identity provisioning
access recovery
access recovery
multi-factor authentication (MFA)
multi-factor authentication (MFA)
user access review
user access review
Suggested answer: A
asked 18/09/2024
Zakaria Boujli
32 questions

Question 525

Report Export Collapse

A minimal implementation of endpoint security includes which of the following?

Trusted platforms
Trusted platforms
Host-based firewalls
Host-based firewalls
Token-based authentication
Token-based authentication
Wireless Access Points (AP)
Wireless Access Points (AP)
Suggested answer: B
asked 18/09/2024
Stefan Finke
44 questions

Question 526

Report Export Collapse

What is the expected outcome of security awareness in support of a security awareness program?

Awareness activities should be used to focus on security concerns and respond to those concerns accordingly
Awareness activities should be used to focus on security concerns and respond to those concerns accordingly
Awareness is not an activity or part of the training but rather a state of persistence to support the program
Awareness is not an activity or part of the training but rather a state of persistence to support the program
Awareness is training. The purpose of awareness presentations is to broaden attention of security.
Awareness is training. The purpose of awareness presentations is to broaden attention of security.
Awareness is not training. The purpose of awareness presentation is simply to focus attention on security.
Awareness is not training. The purpose of awareness presentation is simply to focus attention on security.
Suggested answer: C
asked 18/09/2024
Brian Bell
47 questions

Question 527

Report Export Collapse

Which security modes is MOST commonly used in a commercial environment because it protects the integrity of financial and accounting data?

Biba
Biba
Graham-Denning
Graham-Denning
Clark-Wilson
Clark-Wilson
Beil-LaPadula
Beil-LaPadula
Suggested answer: C
asked 18/09/2024
Nicole Stevens
50 questions

Question 528

Report Export Collapse

Why is planning in Disaster Recovery (DR) an interactive process?

It details off-site storage plans
It details off-site storage plans
It identifies omissions in the plan
It identifies omissions in the plan
It defines the objectives of the plan
It defines the objectives of the plan
It forms part of the awareness process
It forms part of the awareness process
Suggested answer: C
asked 18/09/2024
Judith Persons
39 questions

Question 529

Report Export Collapse

Mandatory Access Controls (MAC) are based on:

security classification and security clearance
security classification and security clearance
data segmentation and data classification
data segmentation and data classification
data labels and user access permissions
data labels and user access permissions
user roles and data encryption
user roles and data encryption
Suggested answer: A
asked 18/09/2024
giorgi durglishvili
45 questions

Question 530

Report Export Collapse

What is the foundation of cryptographic functions?

Encryption
Encryption
Cipher
Cipher
Hash
Hash
Entropy
Entropy
Suggested answer: D
asked 18/09/2024
Babatunde Badiru
43 questions
Total 1.482 questions
Go to page: of 149