ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 68

Question list
Search
Search

Question 671

Report
Export
Collapse

Which of the following entails identification of data end links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

A.
Risk management
A.
Risk management
Answers
B.
Security portfolio management
B.
Security portfolio management
Answers
C.
Security governance
C.
Security governance
Answers
D.
Risk assessment
D.
Risk assessment
Answers
Suggested answer: A
asked 18/09/2024
Mohamed Khazem
25 questions

Question 672

Report
Export
Collapse

Which of the following is critical if an employee is dismissed due to violation of an organization's Acceptable Use Policy (ALP)?

A.
Privilege suspension
A.
Privilege suspension
Answers
B.
Internet access logs
B.
Internet access logs
Answers
C.
Proxy records
C.
Proxy records
Answers
D.
Appropriate documentation
D.
Appropriate documentation
Answers
Suggested answer: B
asked 18/09/2024
Sze Yenn Tan
36 questions

Question 673

Report
Export
Collapse

Which of the following is the PRIMARY security consideration for how an organization should handle Information Technology (IT) assets?

A.
The monetary value of the asset
A.
The monetary value of the asset
Answers
B.
The controls implemented on the asset
B.
The controls implemented on the asset
Answers
C.
The physical form factor of the asset
C.
The physical form factor of the asset
Answers
D.
The classification of the data on the asset
D.
The classification of the data on the asset
Answers
Suggested answer: D
asked 18/09/2024
Prenolan Kamiah
41 questions

Question 674

Report
Export
Collapse

In a dispersed network that lacks central control, which of the following is die PRIMARY course of action to mitigate exposure?

A.
Implement management policies, audit control, and data backups
A.
Implement management policies, audit control, and data backups
Answers
B.
Implement security policies and standards, access controls, and access limitations
B.
Implement security policies and standards, access controls, and access limitations
Answers
C.
Implement security policies and standards, data backups, and audit controls
C.
Implement security policies and standards, data backups, and audit controls
Answers
D.
Implement remote access policies, shared workstations, and log management
D.
Implement remote access policies, shared workstations, and log management
Answers
Suggested answer: C
asked 18/09/2024
Martin Gucký
51 questions

Question 675

Report
Export
Collapse

What are the roles within a scrum methodology?

A.
Scrum master, retirements manager, and development team
A.
Scrum master, retirements manager, and development team
Answers
B.
System owner, scrum master, and development team
B.
System owner, scrum master, and development team
Answers
C.
Scrum master, quality assurance team, and scrum team
C.
Scrum master, quality assurance team, and scrum team
Answers
D.
Product owner, scrum master, and scrum team
D.
Product owner, scrum master, and scrum team
Answers
Suggested answer: D
asked 18/09/2024
Nabil MHB
44 questions

Question 676

Report
Export
Collapse

When conducting a forensic criminal investigation on a computer had drive, what should be dene PRIOR to analysis?

A.
Create a backup copy of all the important files on the drive.
A.
Create a backup copy of all the important files on the drive.
Answers
B.
Power off the computer and wait for assistance.
B.
Power off the computer and wait for assistance.
Answers
C.
Create a forensic image of the hard drive.
C.
Create a forensic image of the hard drive.
Answers
D.
Install forensic analysis software.
D.
Install forensic analysis software.
Answers
Suggested answer: C
asked 18/09/2024
Angel Castillo
32 questions

Question 677

Report
Export
Collapse

Which of the following initiates the systems recovery phase of a disaster recovery plan?

A.
Issuing a formal disaster declaration
A.
Issuing a formal disaster declaration
Answers
B.
Activating the organization's hot site
B.
Activating the organization's hot site
Answers
C.
Evacuating the disaster site
C.
Evacuating the disaster site
Answers
D.
Assessing the extent of damage following the disaster
D.
Assessing the extent of damage following the disaster
Answers
Suggested answer: A
asked 18/09/2024
Josef Anwar Panerio
37 questions

Question 678

Report
Export
Collapse

Which type of fire alarm system sensor is intended to detect fire at its earliest stage?

A.
Ionization
A.
Ionization
Answers
B.
Infrared
B.
Infrared
Answers
C.
Thermal
C.
Thermal
Answers
D.
Photoelectric
D.
Photoelectric
Answers
Suggested answer: A
asked 18/09/2024
Thomas Kincer
39 questions

Question 679

Report
Export
Collapse

An organization implements a Remote Access Server (RAS). Once users correct to the server, digital certificates are used to authenticate their identity. What type of Extensible Authentication Protocol (EAP) would the organization use dring this authentication?

A.
Transport layer security (TLS)
A.
Transport layer security (TLS)
Answers
B.
Message Digest 5 (MD5)
B.
Message Digest 5 (MD5)
Answers
C.
Lightweight Extensible Authentication Protocol (EAP)
C.
Lightweight Extensible Authentication Protocol (EAP)
Answers
D.
Subscriber Identity Module (SIM)
D.
Subscriber Identity Module (SIM)
Answers
Suggested answer: A
asked 18/09/2024
Stelios Mantas
27 questions

Question 680

Report
Export
Collapse

Which of the following MUST a security professional do in order to quantify the value of a security program to organization management?

A.
Report using metrics.
A.
Report using metrics.
Answers
B.
Rank priorities as high, medium, or low.
B.
Rank priorities as high, medium, or low.
Answers
C.
Communicate compliance obstacles.
C.
Communicate compliance obstacles.
Answers
D.
Report en employee activities
D.
Report en employee activities
Answers
Suggested answer: A
asked 18/09/2024
Jason Siemens
36 questions
Total 1.482 questions
Go to page: of 149