ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 65

Add to Whishlist

List of questions

Question 641

Report Export Collapse

If a content management system (CSM) is implemented, which one of the following would occur?

The test and production systems would be riming the same software
The test and production systems would be riming the same software
The applications placed into production would be secure
The applications placed into production would be secure
Developers would no longer have access to production systems
Developers would no longer have access to production systems
Patching the systems would be completed mere quickly
Patching the systems would be completed mere quickly
Suggested answer: A
asked 18/09/2024
Martin Gucký
52 questions

Question 642

Report Export Collapse

During a Disaster Recovery (DR) assessment, additional coverage for assurance is required. What should en assessor do?

Increase the number and type of relevant staff to interview.
Increase the number and type of relevant staff to interview.
Conduct a comprehensive examination of the Disaster Recovery Plan (DRP).
Conduct a comprehensive examination of the Disaster Recovery Plan (DRP).
Increase the level of detail of the interview questions.
Increase the level of detail of the interview questions.
Conduct a detailed review of the organization's DR policy.
Conduct a detailed review of the organization's DR policy.
Suggested answer: A
asked 18/09/2024
RAOUL AMODIO
53 questions

Question 643

Report Export Collapse

Which of the following is an accurate statement when an assessment results in the discovery of vulnerabilities in a critical network component?

The fact that every other host is sufficiently hardened does not change the fact frat the network is placed at risk of attack.
The fact that every other host is sufficiently hardened does not change the fact frat the network is placed at risk of attack.
There is little likelihood that the entire network is being placed at a significant risk of attack.
There is little likelihood that the entire network is being placed at a significant risk of attack.
A second assessment should immediately be performed after all vulnerabilities are corrected.
A second assessment should immediately be performed after all vulnerabilities are corrected.
There is a low possibility that any adjacently connected components have been compromised by an attacker
There is a low possibility that any adjacently connected components have been compromised by an attacker
Suggested answer: C
asked 18/09/2024
Shawn Sullivan
44 questions

Question 644

Report Export Collapse

What technique used for spoofing the origin of an email can successfully conceal the sender s Internet Protocol (IP) address?

Change In-Reply-To data
Change In-Reply-To data
Web crawling
Web crawling
Onion routing
Onion routing
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Suggested answer: C
asked 18/09/2024
Mirza Daniyal Baig
44 questions

Question 645

Report Export Collapse

What is a warn site when conducting Business continuity planning (BCP)

A location, other than the normal facility, used to process data on a daily basis
A location, other than the normal facility, used to process data on a daily basis
An area partially equipped with equipment and resources to recover business functions
An area partially equipped with equipment and resources to recover business functions
A place void of any resources or equipment except air conditioning and raised flooring
A place void of any resources or equipment except air conditioning and raised flooring
An alternate facility that allows for Immediate cutover to enable continuation of business functions
An alternate facility that allows for Immediate cutover to enable continuation of business functions
Suggested answer: B
asked 18/09/2024
Robert Andrade
54 questions

Question 646

Report Export Collapse

Which of the following four iterative steps are conducted on third-party vendors in an on-going basis?

Investigate, Evaluate, Respond, Monitor
Investigate, Evaluate, Respond, Monitor
Frame, Assess, Respond, Monitor
Frame, Assess, Respond, Monitor
Frame, Assess, Remediate, Monitor
Frame, Assess, Remediate, Monitor
Investigate, Assess, Remediate, Monitor
Investigate, Assess, Remediate, Monitor
Suggested answer: C
asked 18/09/2024
Anthony Zaborski
54 questions

Question 647

Report Export Collapse

Which of the following media is least problematic with data remanence?

Magnetic disk
Magnetic disk
Electrically Erasable Programming read-only Memory (EEPROM)
Electrically Erasable Programming read-only Memory (EEPROM)
Dynamic Random Access Memory (DRAM)
Dynamic Random Access Memory (DRAM)
Flash memory
Flash memory
Suggested answer: C
asked 18/09/2024
Ben Ndlovu
41 questions

Question 648

Report Export Collapse

During a recent assessment an organization has discovered that the wireless signal can be detected outside the campus are a. What logical control should be implemented in order to BFST protect One confidentiality of information traveling

One wireless transmission media?

Configure a firewall to logically separate the data at the boundary.
Configure a firewall to logically separate the data at the boundary.
Configure the Access Points (AP) to use Wi-Fi Protected Access 2 (WPA2) encryption.
Configure the Access Points (AP) to use Wi-Fi Protected Access 2 (WPA2) encryption.
Disable the Service Set Identifier (SSID) broadcast on the Access Points (AP).
Disable the Service Set Identifier (SSID) broadcast on the Access Points (AP).
Perform regular technical assessments on the Wireless Local Area Network (WLAN).
Perform regular technical assessments on the Wireless Local Area Network (WLAN).
Suggested answer: B
asked 18/09/2024
Deniz Cimen
31 questions

Question 649

Report Export Collapse

Who is essential for developing effective test scenarios for disaster recovery (DR) test plans?

Business line management and IT staff members
Business line management and IT staff members
Chief Information Officer (CIO) and DR manager
Chief Information Officer (CIO) and DR manager
DR manager end IT staff members
DR manager end IT staff members
IT staff members and project managers
IT staff members and project managers
Suggested answer: B
asked 18/09/2024
José Santos
37 questions

Question 650

Report Export Collapse

Which is the second phase of public key Infrastructure (pk1) key/certificate life-cycle management?

Issued Phase
Issued Phase
Cancellation Phase
Cancellation Phase
Implementation phase
Implementation phase
Initialization Phase
Initialization Phase
Suggested answer: C
asked 18/09/2024
Beena Bamania
38 questions
Total 1.482 questions
Go to page: of 149