ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 62

Question list
Search
Search

Question 611

Report
Export
Collapse

Which of the following is the MOST important security goal when performing application interface testing?

A.
Confirm that all platforms are supported and function properly
A.
Confirm that all platforms are supported and function properly
Answers
B.
Evaluate whether systems or components pass data and control correctly to one another
B.
Evaluate whether systems or components pass data and control correctly to one another
Answers
C.
Verify compatibility of software, hardware, and network connections
C.
Verify compatibility of software, hardware, and network connections
Answers
D.
Examine error conditions related to external interfaces to prevent application details leakage
D.
Examine error conditions related to external interfaces to prevent application details leakage
Answers
Suggested answer: B
asked 18/09/2024
as-sordick alidou
34 questions

Question 612

Report
Export
Collapse

Which of the following is the MOST common method of memory protection?

A.
Compartmentalization
A.
Compartmentalization
Answers
B.
Segmentation
B.
Segmentation
Answers
C.
Error correction
C.
Error correction
Answers
D.
Virtual Local Area Network (VLAN) tagging
D.
Virtual Local Area Network (VLAN) tagging
Answers
Suggested answer: B
asked 18/09/2024
Rafal Wozniak
37 questions

Question 613

Report
Export
Collapse

Attack trees are MOST useful for which of the following?

A.
Determining system security scopes
A.
Determining system security scopes
Answers
B.
Generating attack libraries
B.
Generating attack libraries
Answers
C.
Enumerating threats
C.
Enumerating threats
Answers
D.
Evaluating Denial of Service (DoS) attacks
D.
Evaluating Denial of Service (DoS) attacks
Answers
Suggested answer: C
asked 18/09/2024
e m
34 questions

Question 614

Report
Export
Collapse

Which of the following techniques is known to be effective in spotting resource exhaustion problems, especially with resources such as processes, memory, and connections?

A.
Automated dynamic analysis
A.
Automated dynamic analysis
Answers
B.
Automated static analysis
B.
Automated static analysis
Answers
C.
Manual code review
C.
Manual code review
Answers
D.
Fuzzing
D.
Fuzzing
Answers
Suggested answer: A
asked 18/09/2024
Max Archer
38 questions

Question 615

Report
Export
Collapse

Which one of the following is an advantage of an effective release control strategy form a configuration control standpoint?

A.
Ensures that a trace for all deliverables is maintained and auditable
A.
Ensures that a trace for all deliverables is maintained and auditable
Answers
B.
Enforces backward compatibility between releases
B.
Enforces backward compatibility between releases
Answers
C.
Ensures that there is no loss of functionality between releases
C.
Ensures that there is no loss of functionality between releases
Answers
D.
Allows for future enhancements to existing features
D.
Allows for future enhancements to existing features
Answers
Suggested answer: A
asked 18/09/2024
C/1094 WOLOGUEDE COTONOU – BENIN STEVE
32 questions

Question 616

Report
Export
Collapse

The design review for an application has been completed and is ready for release. What technique should an organization use to assure application integrity?

A.
Application authentication
A.
Application authentication
Answers
B.
Input validation
B.
Input validation
Answers
C.
Digital signing
C.
Digital signing
Answers
D.
Device encryption
D.
Device encryption
Answers
Suggested answer: B
asked 18/09/2024
gokulakrishna S B
37 questions

Question 617

Report
Export
Collapse

What is the BEST location in a network to place Virtual Private Network (VPN) devices when an internal review reveals network design flaws in remote access?

A.
In a dedicated Demilitarized Zone (DMZ)
A.
In a dedicated Demilitarized Zone (DMZ)
Answers
B.
In its own separate Virtual Local Area Network (VLAN)
B.
In its own separate Virtual Local Area Network (VLAN)
Answers
C.
At the Internet Service Provider (ISP)
C.
At the Internet Service Provider (ISP)
Answers
D.
Outside the external firewall
D.
Outside the external firewall
Answers
Suggested answer: B
asked 18/09/2024
Ishan Patel
31 questions

Question 618

Report
Export
Collapse

Which of the following access management procedures would minimize the possibility of an organization's employees retaining access to secure werk areas after they change roles?

A.
User access modification
A.
User access modification
Answers
B.
user access recertification
B.
user access recertification
Answers
C.
User access termination
C.
User access termination
Answers
D.
User access provisioning
D.
User access provisioning
Answers
Suggested answer: B
asked 18/09/2024
Pablo Galilea
26 questions

Question 619

Report
Export
Collapse

What Is the FIRST step in establishing an information security program?

A.
Establish an information security policy.
A.
Establish an information security policy.
Answers
B.
Identify factors affecting information security.
B.
Identify factors affecting information security.
Answers
C.
Establish baseline security controls.
C.
Establish baseline security controls.
Answers
D.
Identify critical security infrastructure.
D.
Identify critical security infrastructure.
Answers
Suggested answer: A
asked 18/09/2024
Ajayi Johnson
45 questions

Question 620

Report
Export
Collapse

Which of the following is MOST effective in detecting information hiding in Transmission Control Protocol/internet Protocol (TCP/IP) traffic?

A.
Stateful inspection firewall
A.
Stateful inspection firewall
Answers
B.
Application-level firewall
B.
Application-level firewall
Answers
C.
Content-filtering proxy
C.
Content-filtering proxy
Answers
D.
Packet-filter firewall
D.
Packet-filter firewall
Answers
Suggested answer: A
asked 18/09/2024
Siegfried Paul
33 questions
Total 1.482 questions
Go to page: of 149