ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 54

Question list
Search
Search

List of questions

Search

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover.

Which access control mechanism would be preferred?

A.
Attribute Based Access Control (ABAC)
A.
Attribute Based Access Control (ABAC)
Answers
B.
Discretionary Access Control (DAC)
B.
Discretionary Access Control (DAC)
Answers
C.
Mandatory Access Control (MAC)
C.
Mandatory Access Control (MAC)
Answers
D.
Role-Based Access Control (RBAC)
D.
Role-Based Access Control (RBAC)
Answers
Suggested answer: D

Which of the following management process allows ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?

A.
Configuration
A.
Configuration
Answers
B.
Identity
B.
Identity
Answers
C.
Compliance
C.
Compliance
Answers
D.
Patch
D.
Patch
Answers
Suggested answer: A

Which security access policy contains fixed security attributes that are used by the system to determine a user's access to a file or object?

A.
Mandatory Access Control (MAC)
A.
Mandatory Access Control (MAC)
Answers
B.
Access Control List (ACL)
B.
Access Control List (ACL)
Answers
C.
Discretionary Access Control (DAC)
C.
Discretionary Access Control (DAC)
Answers
D.
Authorized user control
D.
Authorized user control
Answers
Suggested answer: A

Which of the following is a common characteristic of privacy?

A.
Provision for maintaining an audit trail of access to the private data
A.
Provision for maintaining an audit trail of access to the private data
Answers
B.
Notice to the subject of the existence of a database containing relevant credit card data
B.
Notice to the subject of the existence of a database containing relevant credit card data
Answers
C.
Process for the subject to inspect and correct personal data on-site
C.
Process for the subject to inspect and correct personal data on-site
Answers
D.
Database requirements for integration of privacy data
D.
Database requirements for integration of privacy data
Answers
Suggested answer: C

At a MINIMUM, audits of permissions to individual or group accounts should be scheduled

A.
annually
A.
annually
Answers
B.
to correspond with staff promotions
B.
to correspond with staff promotions
Answers
C.
to correspond with terminations
C.
to correspond with terminations
Answers
D.
continually
D.
continually
Answers
Suggested answer: A

Which of the following is part of a Trusted Platform Module (TPM)?

A.
A non-volatile tamper-resistant storage for storing both data and signing keys in a secure fashion
A.
A non-volatile tamper-resistant storage for storing both data and signing keys in a secure fashion
Answers
B.
A protected Pre-Basic Input/Output System (BIOS) which specifies a method or a metric for "measuring" the state of a computing platform
B.
A protected Pre-Basic Input/Output System (BIOS) which specifies a method or a metric for "measuring" the state of a computing platform
Answers
C.
A secure processor targeted at managing digital keys and accelerating digital signing
C.
A secure processor targeted at managing digital keys and accelerating digital signing
Answers
D.
A platform-independent software interface for accessing computer functions
D.
A platform-independent software interface for accessing computer functions
Answers
Suggested answer: A

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?

A.
Modifying source code without approval
A.
Modifying source code without approval
Answers
B.
Promoting programs to production without approval
B.
Promoting programs to production without approval
Answers
C.
Developers checking out source code without approval
C.
Developers checking out source code without approval
Answers
D.
Developers using Rapid Application Development (RAD) methodologies without approval
D.
Developers using Rapid Application Development (RAD) methodologies without approval
Answers
Suggested answer: A

Which of the following combinations would MOST negatively affect availability?

A.
Denial of Service (DoS) attacks and outdated hardware
A.
Denial of Service (DoS) attacks and outdated hardware
Answers
B.
Unauthorized transactions and outdated hardware
B.
Unauthorized transactions and outdated hardware
Answers
C.
Fire and accidental changes to data
C.
Fire and accidental changes to data
Answers
D.
Unauthorized transactions and denial of service attacks
D.
Unauthorized transactions and denial of service attacks
Answers
Suggested answer: A

Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?

A.
Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.
A.
Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.
Answers
B.
Maintaining segregation of duties.
B.
Maintaining segregation of duties.
Answers
C.
Standardized configurations for logging, alerting, and security metrics.
C.
Standardized configurations for logging, alerting, and security metrics.
Answers
D.
Availability of security teams at the end of design process to perform last-minute manual audits and reviews.
D.
Availability of security teams at the end of design process to perform last-minute manual audits and reviews.
Answers
Suggested answer: B

A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results.

What should be implemented to BEST achieve the desired results?

A.
Configuration Management Database (CMDB)
A.
Configuration Management Database (CMDB)
Answers
B.
Source code repository
B.
Source code repository
Answers
C.
Configuration Management Plan (CMP)
C.
Configuration Management Plan (CMP)
Answers
D.
System performance monitoring application
D.
System performance monitoring application
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149