ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 60

Question list
Search
Search

List of questions

Search

Who is accountable for the information within an Information System (IS)?

A.
Security manager
A.
Security manager
Answers
B.
System owner
B.
System owner
Answers
C.
Data owner
C.
Data owner
Answers
D.
Data processor
D.
Data processor
Answers
Suggested answer: C

It is MOST important to perform which of the following to minimize potential impact when implementing a new vulnerability scanning tool in a production environment?

A.
Negotiate schedule with the Information Technology (IT) operation's team
A.
Negotiate schedule with the Information Technology (IT) operation's team
Answers
B.
Log vulnerability summary reports to a secured server
B.
Log vulnerability summary reports to a secured server
Answers
C.
Enable scanning during off-peak hours
C.
Enable scanning during off-peak hours
Answers
D.
Establish access for Information Technology (IT) management
D.
Establish access for Information Technology (IT) management
Answers
Suggested answer: C

A Security Operations Center (SOC) receives an incident response notification on a server with an active intruder who has planted a backdoor. Initial notifications are sent and communications are established.

What MUST be considered or evaluated before performing the next step?

A.
Notifying law enforcement is crucial before hashing the contents of the server hard drive
A.
Notifying law enforcement is crucial before hashing the contents of the server hard drive
Answers
B.
Identifying who executed the incident is more important than how the incident happened
B.
Identifying who executed the incident is more important than how the incident happened
Answers
C.
Removing the server from the network may prevent catching the intruder
C.
Removing the server from the network may prevent catching the intruder
Answers
D.
Copying the contents of the hard drive to another storage device may damage the evidence
D.
Copying the contents of the hard drive to another storage device may damage the evidence
Answers
Suggested answer: D

Due to system constraints, a group of system administrators must share a high-level access set of credentials.

Which of the following would be MOST appropriate to implement?

A.
Increased console lockout times for failed logon attempts
A.
Increased console lockout times for failed logon attempts
Answers
B.
Reduce the group in size
B.
Reduce the group in size
Answers
C.
A credential check-out process for a per-use basis
C.
A credential check-out process for a per-use basis
Answers
D.
Full logging on affected systems
D.
Full logging on affected systems
Answers
Suggested answer: C

Which of the following is the MOST efficient mechanism to account for all staff during a speedy nonemergency evacuation from a large security facility?

A.
Large mantrap where groups of individuals leaving are identified using facial recognition technology
A.
Large mantrap where groups of individuals leaving are identified using facial recognition technology
Answers
B.
Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor
B.
Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor
Answers
C.
Emergency exits with push bars with coordinates at each exit checking off the individual against a predefined list
C.
Emergency exits with push bars with coordinates at each exit checking off the individual against a predefined list
Answers
D.
Card-activated turnstile where individuals are validated upon exit
D.
Card-activated turnstile where individuals are validated upon exit
Answers
Suggested answer: B

What does electronic vaulting accomplish?

A.
It protects critical files.
A.
It protects critical files.
Answers
B.
It ensures the fault tolerance of Redundant Array of Independent Disks (RAID) systems
B.
It ensures the fault tolerance of Redundant Array of Independent Disks (RAID) systems
Answers
C.
It stripes all database records
C.
It stripes all database records
Answers
D.
It automates the Disaster Recovery Process (DRP)
D.
It automates the Disaster Recovery Process (DRP)
Answers
Suggested answer: A

Who would be the BEST person to approve an organizations information security policy?

A.
Chief Information Officer (CIO)
A.
Chief Information Officer (CIO)
Answers
B.
Chief Information Security Officer (CISO)
B.
Chief Information Security Officer (CISO)
Answers
C.
Chief internal auditor
C.
Chief internal auditor
Answers
D.
Chief Executive Officer (CEO)
D.
Chief Executive Officer (CEO)
Answers
Suggested answer: B

A security analyst for a large financial institution is reviewing network traffic related to an incident.

The analyst determines the traffic is irrelevant to the investigation but in the process of the review, the analyst also finds that an applications data, which included full credit card cardholder data, is transferred in clear text between the server and user's desktop. The analyst knows this violates the Payment Card Industry Data Security Standard (PCI-DSS). Which of the following is the analyst's next step?

A.
Send the log file co-workers for peer review
A.
Send the log file co-workers for peer review
Answers
B.
Include the full network traffic logs in the incident report
B.
Include the full network traffic logs in the incident report
Answers
C.
Follow organizational processes to alert the proper teams to address the issue.
C.
Follow organizational processes to alert the proper teams to address the issue.
Answers
D.
Ignore data as it is outside the scope of the investigation and the analyst's role.
D.
Ignore data as it is outside the scope of the investigation and the analyst's role.
Answers
Suggested answer: C

An Information Technology (IT) professional attends a cybersecurity seminar on current incident response methodologies.

What code of ethics canon is being observed?

A.
Provide diligent and competent service to principals
A.
Provide diligent and competent service to principals
Answers
B.
Protect society, the commonwealth, and the infrastructure
B.
Protect society, the commonwealth, and the infrastructure
Answers
C.
Advance and protect the profession
C.
Advance and protect the profession
Answers
D.
Act honorable, honesty, justly, responsibly, and legally
D.
Act honorable, honesty, justly, responsibly, and legally
Answers
Suggested answer: A

An organization adopts a new firewall hardening standard. How can the security professional verify that the technical staff correct implemented the new standard?

A.
Perform a compliance review
A.
Perform a compliance review
Answers
B.
Perform a penetration test
B.
Perform a penetration test
Answers
C.
Train the technical staff
C.
Train the technical staff
Answers
D.
Survey the technical staff
D.
Survey the technical staff
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149