ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 54

List of questions

Question 531

Report
Export
Collapse

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover.

Which access control mechanism would be preferred?

Attribute Based Access Control (ABAC)
Attribute Based Access Control (ABAC)
Discretionary Access Control (DAC)
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC)
Suggested answer: D
asked 18/09/2024
Vincent Cham
31 questions

Question 532

Report
Export
Collapse

Which of the following management process allows ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?

Configuration
Configuration
Identity
Identity
Compliance
Compliance
Patch
Patch
Suggested answer: A
asked 18/09/2024
Aleh Patskevich
48 questions

Question 533

Report
Export
Collapse

Which security access policy contains fixed security attributes that are used by the system to determine a user's access to a file or object?

Mandatory Access Control (MAC)
Mandatory Access Control (MAC)
Access Control List (ACL)
Access Control List (ACL)
Discretionary Access Control (DAC)
Discretionary Access Control (DAC)
Authorized user control
Authorized user control
Suggested answer: A
asked 18/09/2024
souhaib chabchoub
37 questions

Question 534

Report
Export
Collapse

Which of the following is a common characteristic of privacy?

Provision for maintaining an audit trail of access to the private data
Provision for maintaining an audit trail of access to the private data
Notice to the subject of the existence of a database containing relevant credit card data
Notice to the subject of the existence of a database containing relevant credit card data
Process for the subject to inspect and correct personal data on-site
Process for the subject to inspect and correct personal data on-site
Database requirements for integration of privacy data
Database requirements for integration of privacy data
Suggested answer: C
asked 18/09/2024
Henry Pitcher
32 questions

Question 535

Report
Export
Collapse

At a MINIMUM, audits of permissions to individual or group accounts should be scheduled

annually
annually
to correspond with staff promotions
to correspond with staff promotions
to correspond with terminations
to correspond with terminations
continually
continually
Suggested answer: A
asked 18/09/2024
Brian Carlo Hubilla
36 questions

Question 536

Report
Export
Collapse

Which of the following is part of a Trusted Platform Module (TPM)?

A non-volatile tamper-resistant storage for storing both data and signing keys in a secure fashion
A non-volatile tamper-resistant storage for storing both data and signing keys in a secure fashion
A protected Pre-Basic Input/Output System (BIOS) which specifies a method or a metric for "measuring" the state of a computing platform
A protected Pre-Basic Input/Output System (BIOS) which specifies a method or a metric for "measuring" the state of a computing platform
A secure processor targeted at managing digital keys and accelerating digital signing
A secure processor targeted at managing digital keys and accelerating digital signing
A platform-independent software interface for accessing computer functions
A platform-independent software interface for accessing computer functions
Suggested answer: A
asked 18/09/2024
Herbert Hartwell
38 questions

Question 537

Report
Export
Collapse

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?

Modifying source code without approval
Modifying source code without approval
Promoting programs to production without approval
Promoting programs to production without approval
Developers checking out source code without approval
Developers checking out source code without approval
Developers using Rapid Application Development (RAD) methodologies without approval
Developers using Rapid Application Development (RAD) methodologies without approval
Suggested answer: A
asked 18/09/2024
fritz villanueva
48 questions

Question 538

Report
Export
Collapse

Which of the following combinations would MOST negatively affect availability?

Denial of Service (DoS) attacks and outdated hardware
Denial of Service (DoS) attacks and outdated hardware
Unauthorized transactions and outdated hardware
Unauthorized transactions and outdated hardware
Fire and accidental changes to data
Fire and accidental changes to data
Unauthorized transactions and denial of service attacks
Unauthorized transactions and denial of service attacks
Suggested answer: A
asked 18/09/2024
Anand Dillikumar
29 questions

Question 539

Report
Export
Collapse

Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?

Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.
Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.
Maintaining segregation of duties.
Maintaining segregation of duties.
Standardized configurations for logging, alerting, and security metrics.
Standardized configurations for logging, alerting, and security metrics.
Availability of security teams at the end of design process to perform last-minute manual audits and reviews.
Availability of security teams at the end of design process to perform last-minute manual audits and reviews.
Suggested answer: B
asked 18/09/2024
ola adekanbi
38 questions

Question 540

Report
Export
Collapse

A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results.

What should be implemented to BEST achieve the desired results?

Configuration Management Database (CMDB)
Configuration Management Database (CMDB)
Source code repository
Source code repository
Configuration Management Plan (CMP)
Configuration Management Plan (CMP)
System performance monitoring application
System performance monitoring application
Suggested answer: A
asked 18/09/2024
Fiertelmeister Tibor
33 questions
Total 1.482 questions
Go to page: of 149
Search