ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 66

Add to Whishlist

List of questions

Question 651

Report Export Collapse

Which of the following is MOST important when determining appropriate countermeasures for an identified risk?

Interaction with existing controls
Interaction with existing controls
Cost
Cost
Organizational risk tolerance
Organizational risk tolerance
Patch availability
Patch availability
Suggested answer: C
asked 18/09/2024
Siegfried Paul
38 questions

Question 652

Report Export Collapse

When a flaw in Industrial control (ICS) software is discovered, what is the GREATEST impediment to deploying a patch?

Many IG systems have software that is no longer being maintained by the venders.
Many IG systems have software that is no longer being maintained by the venders.
Compensating controls may impact IG performance.
Compensating controls may impact IG performance.
Testing a patch in an IG may require more resources than the organization can commit.
Testing a patch in an IG may require more resources than the organization can commit.
vendors are required to validate the operability patches.
vendors are required to validate the operability patches.
Suggested answer: D
asked 18/09/2024
Abdullah Mousa
54 questions

Question 653

Report Export Collapse

Which of the following is the BEST approach for a forensic examiner to obtain the greatest amount of relevant information form malicious software?

Analyze the behavior of the program.
Analyze the behavior of the program.
Examine the file properties and permissions.
Examine the file properties and permissions.
Review the code to identify its origin.
Review the code to identify its origin.
Analyze the logs generated by the software.
Analyze the logs generated by the software.
Suggested answer: A
asked 18/09/2024
Lukas Reker
36 questions

Question 654

Report Export Collapse

In fault-tolerant systems, what do rollback capabilities permit?

Restoring the system to a previous functional state
Restoring the system to a previous functional state
Identifying the error that caused the problem
Identifying the error that caused the problem
Allowing the system to an in a reduced manner
Allowing the system to an in a reduced manner
Isolating the error that caused the problem
Isolating the error that caused the problem
Suggested answer: A
asked 18/09/2024
Sebasteen Lawrance
49 questions

Question 655

Report Export Collapse

How does identity as a service (IDaaS) provide an easy mechanism for integrating identity service into individual applications with minimal development effort?

By allowing the identification logic and storage of an identity's attributes to be maintained externally
By allowing the identification logic and storage of an identity's attributes to be maintained externally
By integrating internal provisioning procedures with external authentication processes
By integrating internal provisioning procedures with external authentication processes
By allowing for internal provisioning of user accounts
By allowing for internal provisioning of user accounts
By keeping all user information in easily accessible cloud repositories
By keeping all user information in easily accessible cloud repositories
Suggested answer: D
asked 18/09/2024
Martin Schwarz
43 questions

Question 656

Report Export Collapse

A security practitioner has been tasked with establishing organizational asset handling procedures.

What should be considered that would have the GRFATEST impact to the development of these procedures?

Media handling procedures
Media handling procedures
User roles and responsibilities
User roles and responsibilities
Acceptable Use Policy (ALP)
Acceptable Use Policy (ALP)
Information classification scheme
Information classification scheme
Suggested answer: D
asked 18/09/2024
Zarate, Wilfredo
46 questions

Question 657

Report Export Collapse

From an asset security perspective, what is the BEST countermeasure to prevent data theft due to data remanence when a sensitive data storage media is no longer needed?

Return the media to the system owner.
Return the media to the system owner.
Delete the sensitive data from the media.
Delete the sensitive data from the media.
Physically destroy the retired media.
Physically destroy the retired media.
Encrypt data before it Is stored on the media.
Encrypt data before it Is stored on the media.
Suggested answer: C
asked 18/09/2024
Amine Alami
41 questions

Question 658

Report Export Collapse

A project requires the use of en authentication mechanism where playback must be protected and plaintext secret must be used. Which of the following should be used?

Password Authentication Protocol (PAP)
Password Authentication Protocol (PAP)
Extensible Authentication Protocol (EAP)
Extensible Authentication Protocol (EAP)
Secure Hash Algorithm (SHA)
Secure Hash Algorithm (SHA)
Challenge Handshake Authentication Protocol (CHAP)
Challenge Handshake Authentication Protocol (CHAP)
Suggested answer: A
asked 18/09/2024
Arpita Pattnayak
54 questions

Question 659

Report Export Collapse

Which of the following threats exists with an implementation of digital signatures?

Spoofing
Spoofing
Substitution
Substitution
Content tampering
Content tampering
Eavesdropping
Eavesdropping
Suggested answer: A
asked 18/09/2024
shubha sunil
39 questions

Question 660

Report Export Collapse

What should be used immediately after a Business Continuity Plan (BCP) has been invoked?

Resumption procedures describing the actions to be taken to return to normal business operations
Resumption procedures describing the actions to be taken to return to normal business operations
Emergency procedures describing the necessary actions to be taken following an incident jeopardizes business operations
Emergency procedures describing the necessary actions to be taken following an incident jeopardizes business operations
Fallback procedures describing what action are to be taken to more essential business activities to alternative temporary locations
Fallback procedures describing what action are to be taken to more essential business activities to alternative temporary locations
Maintain schedule how and the plan will be tested and the process for maintaining the plan
Maintain schedule how and the plan will be tested and the process for maintaining the plan
Suggested answer: B
asked 18/09/2024
Yusuf E
45 questions
Total 1.482 questions
Go to page: of 149