ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 66

Question list
Search
Search

List of questions

Search

Which of the following is MOST important when determining appropriate countermeasures for an identified risk?

A.
Interaction with existing controls
A.
Interaction with existing controls
Answers
B.
Cost
B.
Cost
Answers
C.
Organizational risk tolerance
C.
Organizational risk tolerance
Answers
D.
Patch availability
D.
Patch availability
Answers
Suggested answer: C

When a flaw in Industrial control (ICS) software is discovered, what is the GREATEST impediment to deploying a patch?

A.
Many IG systems have software that is no longer being maintained by the venders.
A.
Many IG systems have software that is no longer being maintained by the venders.
Answers
B.
Compensating controls may impact IG performance.
B.
Compensating controls may impact IG performance.
Answers
C.
Testing a patch in an IG may require more resources than the organization can commit.
C.
Testing a patch in an IG may require more resources than the organization can commit.
Answers
D.
vendors are required to validate the operability patches.
D.
vendors are required to validate the operability patches.
Answers
Suggested answer: D

Which of the following is the BEST approach for a forensic examiner to obtain the greatest amount of relevant information form malicious software?

A.
Analyze the behavior of the program.
A.
Analyze the behavior of the program.
Answers
B.
Examine the file properties and permissions.
B.
Examine the file properties and permissions.
Answers
C.
Review the code to identify its origin.
C.
Review the code to identify its origin.
Answers
D.
Analyze the logs generated by the software.
D.
Analyze the logs generated by the software.
Answers
Suggested answer: A

In fault-tolerant systems, what do rollback capabilities permit?

A.
Restoring the system to a previous functional state
A.
Restoring the system to a previous functional state
Answers
B.
Identifying the error that caused the problem
B.
Identifying the error that caused the problem
Answers
C.
Allowing the system to an in a reduced manner
C.
Allowing the system to an in a reduced manner
Answers
D.
Isolating the error that caused the problem
D.
Isolating the error that caused the problem
Answers
Suggested answer: A

How does identity as a service (IDaaS) provide an easy mechanism for integrating identity service into individual applications with minimal development effort?

A.
By allowing the identification logic and storage of an identity's attributes to be maintained externally
A.
By allowing the identification logic and storage of an identity's attributes to be maintained externally
Answers
B.
By integrating internal provisioning procedures with external authentication processes
B.
By integrating internal provisioning procedures with external authentication processes
Answers
C.
By allowing for internal provisioning of user accounts
C.
By allowing for internal provisioning of user accounts
Answers
D.
By keeping all user information in easily accessible cloud repositories
D.
By keeping all user information in easily accessible cloud repositories
Answers
Suggested answer: D

A security practitioner has been tasked with establishing organizational asset handling procedures.

What should be considered that would have the GRFATEST impact to the development of these procedures?

A.
Media handling procedures
A.
Media handling procedures
Answers
B.
User roles and responsibilities
B.
User roles and responsibilities
Answers
C.
Acceptable Use Policy (ALP)
C.
Acceptable Use Policy (ALP)
Answers
D.
Information classification scheme
D.
Information classification scheme
Answers
Suggested answer: D

From an asset security perspective, what is the BEST countermeasure to prevent data theft due to data remanence when a sensitive data storage media is no longer needed?

A.
Return the media to the system owner.
A.
Return the media to the system owner.
Answers
B.
Delete the sensitive data from the media.
B.
Delete the sensitive data from the media.
Answers
C.
Physically destroy the retired media.
C.
Physically destroy the retired media.
Answers
D.
Encrypt data before it Is stored on the media.
D.
Encrypt data before it Is stored on the media.
Answers
Suggested answer: C

A project requires the use of en authentication mechanism where playback must be protected and plaintext secret must be used. Which of the following should be used?

A.
Password Authentication Protocol (PAP)
A.
Password Authentication Protocol (PAP)
Answers
B.
Extensible Authentication Protocol (EAP)
B.
Extensible Authentication Protocol (EAP)
Answers
C.
Secure Hash Algorithm (SHA)
C.
Secure Hash Algorithm (SHA)
Answers
D.
Challenge Handshake Authentication Protocol (CHAP)
D.
Challenge Handshake Authentication Protocol (CHAP)
Answers
Suggested answer: A

Which of the following threats exists with an implementation of digital signatures?

A.
Spoofing
A.
Spoofing
Answers
B.
Substitution
B.
Substitution
Answers
C.
Content tampering
C.
Content tampering
Answers
D.
Eavesdropping
D.
Eavesdropping
Answers
Suggested answer: A

What should be used immediately after a Business Continuity Plan (BCP) has been invoked?

A.
Resumption procedures describing the actions to be taken to return to normal business operations
A.
Resumption procedures describing the actions to be taken to return to normal business operations
Answers
B.
Emergency procedures describing the necessary actions to be taken following an incident jeopardizes business operations
B.
Emergency procedures describing the necessary actions to be taken following an incident jeopardizes business operations
Answers
C.
Fallback procedures describing what action are to be taken to more essential business activities to alternative temporary locations
C.
Fallback procedures describing what action are to be taken to more essential business activities to alternative temporary locations
Answers
D.
Maintain schedule how and the plan will be tested and the process for maintaining the plan
D.
Maintain schedule how and the plan will be tested and the process for maintaining the plan
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149