ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 62

List of questions

Question 611

Report Export Collapse

Which of the following is the MOST important security goal when performing application interface testing?

Confirm that all platforms are supported and function properly
Confirm that all platforms are supported and function properly
Evaluate whether systems or components pass data and control correctly to one another
Evaluate whether systems or components pass data and control correctly to one another
Verify compatibility of software, hardware, and network connections
Verify compatibility of software, hardware, and network connections
Examine error conditions related to external interfaces to prevent application details leakage
Examine error conditions related to external interfaces to prevent application details leakage
Suggested answer: B
asked 18/09/2024
as-sordick alidou
41 questions

Question 612

Report Export Collapse

Which of the following is the MOST common method of memory protection?

Compartmentalization
Compartmentalization
Segmentation
Segmentation
Error correction
Error correction
Virtual Local Area Network (VLAN) tagging
Virtual Local Area Network (VLAN) tagging
Suggested answer: B
asked 18/09/2024
Rafal Wozniak
42 questions

Question 613

Report Export Collapse

Attack trees are MOST useful for which of the following?

Determining system security scopes
Determining system security scopes
Generating attack libraries
Generating attack libraries
Enumerating threats
Enumerating threats
Evaluating Denial of Service (DoS) attacks
Evaluating Denial of Service (DoS) attacks
Suggested answer: C
asked 18/09/2024
e m
37 questions

Question 614

Report Export Collapse

Which of the following techniques is known to be effective in spotting resource exhaustion problems, especially with resources such as processes, memory, and connections?

Automated dynamic analysis
Automated dynamic analysis
Automated static analysis
Automated static analysis
Manual code review
Manual code review
Fuzzing
Fuzzing
Suggested answer: A
asked 18/09/2024
Max Archer
46 questions

Question 615

Report Export Collapse

Which one of the following is an advantage of an effective release control strategy form a configuration control standpoint?

Ensures that a trace for all deliverables is maintained and auditable
Ensures that a trace for all deliverables is maintained and auditable
Enforces backward compatibility between releases
Enforces backward compatibility between releases
Ensures that there is no loss of functionality between releases
Ensures that there is no loss of functionality between releases
Allows for future enhancements to existing features
Allows for future enhancements to existing features
Suggested answer: A
asked 18/09/2024
C/1094 WOLOGUEDE COTONOU – BENIN STEVE
41 questions

Question 616

Report Export Collapse

The design review for an application has been completed and is ready for release. What technique should an organization use to assure application integrity?

Application authentication
Application authentication
Input validation
Input validation
Digital signing
Digital signing
Device encryption
Device encryption
Suggested answer: B
asked 18/09/2024
gokulakrishna S B
40 questions

Question 617

Report Export Collapse

What is the BEST location in a network to place Virtual Private Network (VPN) devices when an internal review reveals network design flaws in remote access?

In a dedicated Demilitarized Zone (DMZ)
In a dedicated Demilitarized Zone (DMZ)
In its own separate Virtual Local Area Network (VLAN)
In its own separate Virtual Local Area Network (VLAN)
At the Internet Service Provider (ISP)
At the Internet Service Provider (ISP)
Outside the external firewall
Outside the external firewall
Suggested answer: B
asked 18/09/2024
Ishan Patel
35 questions

Question 618

Report Export Collapse

Which of the following access management procedures would minimize the possibility of an organization's employees retaining access to secure werk areas after they change roles?

User access modification
User access modification
user access recertification
user access recertification
User access termination
User access termination
User access provisioning
User access provisioning
Suggested answer: B
asked 18/09/2024
Pablo Galilea
36 questions

Question 619

Report Export Collapse

What Is the FIRST step in establishing an information security program?

Establish an information security policy.
Establish an information security policy.
Identify factors affecting information security.
Identify factors affecting information security.
Establish baseline security controls.
Establish baseline security controls.
Identify critical security infrastructure.
Identify critical security infrastructure.
Suggested answer: A
asked 18/09/2024
Ajayi Johnson
52 questions

Question 620

Report Export Collapse

Which of the following is MOST effective in detecting information hiding in Transmission Control Protocol/internet Protocol (TCP/IP) traffic?

Stateful inspection firewall
Stateful inspection firewall
Application-level firewall
Application-level firewall
Content-filtering proxy
Content-filtering proxy
Packet-filter firewall
Packet-filter firewall
Suggested answer: A
asked 18/09/2024
Siegfried Paul
38 questions
Total 1.482 questions
Go to page: of 149