ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 66

Question list
Search
Search

List of questions

Search

Question 651

Report
Export
Collapse

Which of the following is MOST important when determining appropriate countermeasures for an identified risk?

A.
Interaction with existing controls
A.
Interaction with existing controls
Answers
B.
Cost
B.
Cost
Answers
C.
Organizational risk tolerance
C.
Organizational risk tolerance
Answers
D.
Patch availability
D.
Patch availability
Answers
Suggested answer: C
asked 18/09/2024
Siegfried Paul
33 questions

Question 652

Report
Export
Collapse

When a flaw in Industrial control (ICS) software is discovered, what is the GREATEST impediment to deploying a patch?

A.
Many IG systems have software that is no longer being maintained by the venders.
A.
Many IG systems have software that is no longer being maintained by the venders.
Answers
B.
Compensating controls may impact IG performance.
B.
Compensating controls may impact IG performance.
Answers
C.
Testing a patch in an IG may require more resources than the organization can commit.
C.
Testing a patch in an IG may require more resources than the organization can commit.
Answers
D.
vendors are required to validate the operability patches.
D.
vendors are required to validate the operability patches.
Answers
Suggested answer: D
asked 18/09/2024
Abdullah Mousa
45 questions

Question 653

Report
Export
Collapse

Which of the following is the BEST approach for a forensic examiner to obtain the greatest amount of relevant information form malicious software?

A.
Analyze the behavior of the program.
A.
Analyze the behavior of the program.
Answers
B.
Examine the file properties and permissions.
B.
Examine the file properties and permissions.
Answers
C.
Review the code to identify its origin.
C.
Review the code to identify its origin.
Answers
D.
Analyze the logs generated by the software.
D.
Analyze the logs generated by the software.
Answers
Suggested answer: A
asked 18/09/2024
Lukas Reker
31 questions

Question 654

Report
Export
Collapse

In fault-tolerant systems, what do rollback capabilities permit?

A.
Restoring the system to a previous functional state
A.
Restoring the system to a previous functional state
Answers
B.
Identifying the error that caused the problem
B.
Identifying the error that caused the problem
Answers
C.
Allowing the system to an in a reduced manner
C.
Allowing the system to an in a reduced manner
Answers
D.
Isolating the error that caused the problem
D.
Isolating the error that caused the problem
Answers
Suggested answer: A
asked 18/09/2024
Sebasteen Lawrance
43 questions

Question 655

Report
Export
Collapse

How does identity as a service (IDaaS) provide an easy mechanism for integrating identity service into individual applications with minimal development effort?

A.
By allowing the identification logic and storage of an identity's attributes to be maintained externally
A.
By allowing the identification logic and storage of an identity's attributes to be maintained externally
Answers
B.
By integrating internal provisioning procedures with external authentication processes
B.
By integrating internal provisioning procedures with external authentication processes
Answers
C.
By allowing for internal provisioning of user accounts
C.
By allowing for internal provisioning of user accounts
Answers
D.
By keeping all user information in easily accessible cloud repositories
D.
By keeping all user information in easily accessible cloud repositories
Answers
Suggested answer: D
asked 18/09/2024
Martin Schwarz
35 questions

Question 656

Report
Export
Collapse

A security practitioner has been tasked with establishing organizational asset handling procedures.

What should be considered that would have the GRFATEST impact to the development of these procedures?

A.
Media handling procedures
A.
Media handling procedures
Answers
B.
User roles and responsibilities
B.
User roles and responsibilities
Answers
C.
Acceptable Use Policy (ALP)
C.
Acceptable Use Policy (ALP)
Answers
D.
Information classification scheme
D.
Information classification scheme
Answers
Suggested answer: D
asked 18/09/2024
Zarate, Wilfredo
41 questions

Question 657

Report
Export
Collapse

From an asset security perspective, what is the BEST countermeasure to prevent data theft due to data remanence when a sensitive data storage media is no longer needed?

A.
Return the media to the system owner.
A.
Return the media to the system owner.
Answers
B.
Delete the sensitive data from the media.
B.
Delete the sensitive data from the media.
Answers
C.
Physically destroy the retired media.
C.
Physically destroy the retired media.
Answers
D.
Encrypt data before it Is stored on the media.
D.
Encrypt data before it Is stored on the media.
Answers
Suggested answer: C
asked 18/09/2024
Amine Alami
32 questions

Question 658

Report
Export
Collapse

A project requires the use of en authentication mechanism where playback must be protected and plaintext secret must be used. Which of the following should be used?

A.
Password Authentication Protocol (PAP)
A.
Password Authentication Protocol (PAP)
Answers
B.
Extensible Authentication Protocol (EAP)
B.
Extensible Authentication Protocol (EAP)
Answers
C.
Secure Hash Algorithm (SHA)
C.
Secure Hash Algorithm (SHA)
Answers
D.
Challenge Handshake Authentication Protocol (CHAP)
D.
Challenge Handshake Authentication Protocol (CHAP)
Answers
Suggested answer: A
asked 18/09/2024
Arpita Pattnayak
50 questions

Question 659

Report
Export
Collapse

Which of the following threats exists with an implementation of digital signatures?

A.
Spoofing
A.
Spoofing
Answers
B.
Substitution
B.
Substitution
Answers
C.
Content tampering
C.
Content tampering
Answers
D.
Eavesdropping
D.
Eavesdropping
Answers
Suggested answer: A
asked 18/09/2024
shubha sunil
36 questions

Question 660

Report
Export
Collapse

What should be used immediately after a Business Continuity Plan (BCP) has been invoked?

A.
Resumption procedures describing the actions to be taken to return to normal business operations
A.
Resumption procedures describing the actions to be taken to return to normal business operations
Answers
B.
Emergency procedures describing the necessary actions to be taken following an incident jeopardizes business operations
B.
Emergency procedures describing the necessary actions to be taken following an incident jeopardizes business operations
Answers
C.
Fallback procedures describing what action are to be taken to more essential business activities to alternative temporary locations
C.
Fallback procedures describing what action are to be taken to more essential business activities to alternative temporary locations
Answers
D.
Maintain schedule how and the plan will be tested and the process for maintaining the plan
D.
Maintain schedule how and the plan will be tested and the process for maintaining the plan
Answers
Suggested answer: B
asked 18/09/2024
Yusuf E
38 questions
Total 1.482 questions
Go to page: of 149