ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 64

Question list
Search
Search

List of questions

Search

Which of the following is a characteristic of a challenge/response authentication process?

A.
Using a password history blacklist
A.
Using a password history blacklist
Answers
B.
Transmitting a hash based on the user's password
B.
Transmitting a hash based on the user's password
Answers
C.
Presenting distorted gravies of text for authentication
C.
Presenting distorted gravies of text for authentication
Answers
D.
Requiring the use of non-consecutive numeric characters
D.
Requiring the use of non-consecutive numeric characters
Answers
Suggested answer: C

Which of the following is the PRIMARY risk associated with Extensible Markup Language (XML) applications?

A.
Users can manipulate the code.
A.
Users can manipulate the code.
Answers
B.
The stack data structure cannot be replicated.
B.
The stack data structure cannot be replicated.
Answers
C.
The stack data structure is repetitive.
C.
The stack data structure is repetitive.
Answers
D.
Potential sensitive data leakage.
D.
Potential sensitive data leakage.
Answers
Suggested answer: A

Activity to baseline, tailor, and scope security controls tikes place dring which National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) step?

A.
Authorize IS.
A.
Authorize IS.
Answers
B.
Assess security controls.
B.
Assess security controls.
Answers
C.
Categorize Information system (IS).
C.
Categorize Information system (IS).
Answers
D.
Select security controls.
D.
Select security controls.
Answers
Suggested answer: D

A large corporation is locking for a solution to automate access based on where on request is coming from, who the user is, what device they are connecting with, and what time of day they are attempting this access. What type of solution would suit their needs?

A.
Discretionary Access Control (DAC)
A.
Discretionary Access Control (DAC)
Answers
B.
Role Based Access Control (RBAC)
B.
Role Based Access Control (RBAC)
Answers
C.
Mandater Access Control (MAC)
C.
Mandater Access Control (MAC)
Answers
D.
Network Access Control (NAC)
D.
Network Access Control (NAC)
Answers
Suggested answer: D

Which one of the following is an advantage of an effective release control strategy from a configuration control standpoint?

A.
Ensures that there is no loss of functionality between releases
A.
Ensures that there is no loss of functionality between releases
Answers
B.
Allows for future enhancements to existing features
B.
Allows for future enhancements to existing features
Answers
C.
Enforces backward compatibility between releases
C.
Enforces backward compatibility between releases
Answers
D.
Ensures that a trace for all deliverables is maintained and auditable
D.
Ensures that a trace for all deliverables is maintained and auditable
Answers
Suggested answer: C

When adopting software as a service (Saas), which security responsibility will remain with remain with the adopting organization?

A.
Physical security
A.
Physical security
Answers
B.
Data classification
B.
Data classification
Answers
C.
Network control
C.
Network control
Answers
D.
Application layer control
D.
Application layer control
Answers
Suggested answer: B

Secure real-time transport protocol (SRTP) provides security for which of the following?

A.
time sensitive e-communication
A.
time sensitive e-communication
Answers
B.
Voice communication
B.
Voice communication
Answers
C.
Satellite communication
C.
Satellite communication
Answers
D.
Network Communication for real-time operating systems
D.
Network Communication for real-time operating systems
Answers
Suggested answer: B

Which of the following authorization standards is built to handle Application Programming Interface (API) access for Federated Identity Management (FIM)?

A.
Security Assertion Markup Language (SAML)
A.
Security Assertion Markup Language (SAML)
Answers
B.
Open Authentication (OAUTH)
B.
Open Authentication (OAUTH)
Answers
C.
Remote Authentication Dial-in User service (RADIUS)
C.
Remote Authentication Dial-in User service (RADIUS)
Answers
D.
Terminal Access Control Access Control System Plus (TACACS+)
D.
Terminal Access Control Access Control System Plus (TACACS+)
Answers
Suggested answer: B

Which programming methodology allows a programmer to use pre-determined blocks of code end consequently reducing development time and programming costs?

A.
Application security
A.
Application security
Answers
B.
Object oriented
B.
Object oriented
Answers
C.
Blocked algorithm
C.
Blocked algorithm
Answers
D.
Assembly language
D.
Assembly language
Answers
Suggested answer: B

Why do certificate Authorities (CA) add value to the security of electronic commerce transactions?

A.
They maintain the certificate revocation list.
A.
They maintain the certificate revocation list.
Answers
B.
They maintain the private keys of transition parties.
B.
They maintain the private keys of transition parties.
Answers
C.
They verify the transaction parties' private keys.
C.
They verify the transaction parties' private keys.
Answers
D.
They provide a secure communication enamel to the transaction parties.
D.
They provide a secure communication enamel to the transaction parties.
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149