ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 65

Question list
Search
Search

If a content management system (CSM) is implemented, which one of the following would occur?

A.
The test and production systems would be riming the same software
A.
The test and production systems would be riming the same software
Answers
B.
The applications placed into production would be secure
B.
The applications placed into production would be secure
Answers
C.
Developers would no longer have access to production systems
C.
Developers would no longer have access to production systems
Answers
D.
Patching the systems would be completed mere quickly
D.
Patching the systems would be completed mere quickly
Answers
Suggested answer: A

During a Disaster Recovery (DR) assessment, additional coverage for assurance is required. What should en assessor do?

A.
Increase the number and type of relevant staff to interview.
A.
Increase the number and type of relevant staff to interview.
Answers
B.
Conduct a comprehensive examination of the Disaster Recovery Plan (DRP).
B.
Conduct a comprehensive examination of the Disaster Recovery Plan (DRP).
Answers
C.
Increase the level of detail of the interview questions.
C.
Increase the level of detail of the interview questions.
Answers
D.
Conduct a detailed review of the organization's DR policy.
D.
Conduct a detailed review of the organization's DR policy.
Answers
Suggested answer: A

Which of the following is an accurate statement when an assessment results in the discovery of vulnerabilities in a critical network component?

A.
The fact that every other host is sufficiently hardened does not change the fact frat the network is placed at risk of attack.
A.
The fact that every other host is sufficiently hardened does not change the fact frat the network is placed at risk of attack.
Answers
B.
There is little likelihood that the entire network is being placed at a significant risk of attack.
B.
There is little likelihood that the entire network is being placed at a significant risk of attack.
Answers
C.
A second assessment should immediately be performed after all vulnerabilities are corrected.
C.
A second assessment should immediately be performed after all vulnerabilities are corrected.
Answers
D.
There is a low possibility that any adjacently connected components have been compromised by an attacker
D.
There is a low possibility that any adjacently connected components have been compromised by an attacker
Answers
Suggested answer: C

What technique used for spoofing the origin of an email can successfully conceal the sender s Internet Protocol (IP) address?

A.
Change In-Reply-To data
A.
Change In-Reply-To data
Answers
B.
Web crawling
B.
Web crawling
Answers
C.
Onion routing
C.
Onion routing
Answers
D.
Virtual Private Network (VPN)
D.
Virtual Private Network (VPN)
Answers
Suggested answer: C

What is a warn site when conducting Business continuity planning (BCP)

A.
A location, other than the normal facility, used to process data on a daily basis
A.
A location, other than the normal facility, used to process data on a daily basis
Answers
B.
An area partially equipped with equipment and resources to recover business functions
B.
An area partially equipped with equipment and resources to recover business functions
Answers
C.
A place void of any resources or equipment except air conditioning and raised flooring
C.
A place void of any resources or equipment except air conditioning and raised flooring
Answers
D.
An alternate facility that allows for Immediate cutover to enable continuation of business functions
D.
An alternate facility that allows for Immediate cutover to enable continuation of business functions
Answers
Suggested answer: B

Which of the following four iterative steps are conducted on third-party vendors in an on-going basis?

A.
Investigate, Evaluate, Respond, Monitor
A.
Investigate, Evaluate, Respond, Monitor
Answers
B.
Frame, Assess, Respond, Monitor
B.
Frame, Assess, Respond, Monitor
Answers
C.
Frame, Assess, Remediate, Monitor
C.
Frame, Assess, Remediate, Monitor
Answers
D.
Investigate, Assess, Remediate, Monitor
D.
Investigate, Assess, Remediate, Monitor
Answers
Suggested answer: C

Which of the following media is least problematic with data remanence?

A.
Magnetic disk
A.
Magnetic disk
Answers
B.
Electrically Erasable Programming read-only Memory (EEPROM)
B.
Electrically Erasable Programming read-only Memory (EEPROM)
Answers
C.
Dynamic Random Access Memory (DRAM)
C.
Dynamic Random Access Memory (DRAM)
Answers
D.
Flash memory
D.
Flash memory
Answers
Suggested answer: C

During a recent assessment an organization has discovered that the wireless signal can be detected outside the campus are a. What logical control should be implemented in order to BFST protect One confidentiality of information traveling

One wireless transmission media?

A.
Configure a firewall to logically separate the data at the boundary.
A.
Configure a firewall to logically separate the data at the boundary.
Answers
B.
Configure the Access Points (AP) to use Wi-Fi Protected Access 2 (WPA2) encryption.
B.
Configure the Access Points (AP) to use Wi-Fi Protected Access 2 (WPA2) encryption.
Answers
C.
Disable the Service Set Identifier (SSID) broadcast on the Access Points (AP).
C.
Disable the Service Set Identifier (SSID) broadcast on the Access Points (AP).
Answers
D.
Perform regular technical assessments on the Wireless Local Area Network (WLAN).
D.
Perform regular technical assessments on the Wireless Local Area Network (WLAN).
Answers
Suggested answer: B

Who is essential for developing effective test scenarios for disaster recovery (DR) test plans?

A.
Business line management and IT staff members
A.
Business line management and IT staff members
Answers
B.
Chief Information Officer (CIO) and DR manager
B.
Chief Information Officer (CIO) and DR manager
Answers
C.
DR manager end IT staff members
C.
DR manager end IT staff members
Answers
D.
IT staff members and project managers
D.
IT staff members and project managers
Answers
Suggested answer: B

Which is the second phase of public key Infrastructure (pk1) key/certificate life-cycle management?

A.
Issued Phase
A.
Issued Phase
Answers
B.
Cancellation Phase
B.
Cancellation Phase
Answers
C.
Implementation phase
C.
Implementation phase
Answers
D.
Initialization Phase
D.
Initialization Phase
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149