ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 68

Question list
Search
Search

Which of the following entails identification of data end links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

A.
Risk management
A.
Risk management
Answers
B.
Security portfolio management
B.
Security portfolio management
Answers
C.
Security governance
C.
Security governance
Answers
D.
Risk assessment
D.
Risk assessment
Answers
Suggested answer: A

Which of the following is critical if an employee is dismissed due to violation of an organization's Acceptable Use Policy (ALP)?

A.
Privilege suspension
A.
Privilege suspension
Answers
B.
Internet access logs
B.
Internet access logs
Answers
C.
Proxy records
C.
Proxy records
Answers
D.
Appropriate documentation
D.
Appropriate documentation
Answers
Suggested answer: B

Which of the following is the PRIMARY security consideration for how an organization should handle Information Technology (IT) assets?

A.
The monetary value of the asset
A.
The monetary value of the asset
Answers
B.
The controls implemented on the asset
B.
The controls implemented on the asset
Answers
C.
The physical form factor of the asset
C.
The physical form factor of the asset
Answers
D.
The classification of the data on the asset
D.
The classification of the data on the asset
Answers
Suggested answer: D

In a dispersed network that lacks central control, which of the following is die PRIMARY course of action to mitigate exposure?

A.
Implement management policies, audit control, and data backups
A.
Implement management policies, audit control, and data backups
Answers
B.
Implement security policies and standards, access controls, and access limitations
B.
Implement security policies and standards, access controls, and access limitations
Answers
C.
Implement security policies and standards, data backups, and audit controls
C.
Implement security policies and standards, data backups, and audit controls
Answers
D.
Implement remote access policies, shared workstations, and log management
D.
Implement remote access policies, shared workstations, and log management
Answers
Suggested answer: C

What are the roles within a scrum methodology?

A.
Scrum master, retirements manager, and development team
A.
Scrum master, retirements manager, and development team
Answers
B.
System owner, scrum master, and development team
B.
System owner, scrum master, and development team
Answers
C.
Scrum master, quality assurance team, and scrum team
C.
Scrum master, quality assurance team, and scrum team
Answers
D.
Product owner, scrum master, and scrum team
D.
Product owner, scrum master, and scrum team
Answers
Suggested answer: D

When conducting a forensic criminal investigation on a computer had drive, what should be dene PRIOR to analysis?

A.
Create a backup copy of all the important files on the drive.
A.
Create a backup copy of all the important files on the drive.
Answers
B.
Power off the computer and wait for assistance.
B.
Power off the computer and wait for assistance.
Answers
C.
Create a forensic image of the hard drive.
C.
Create a forensic image of the hard drive.
Answers
D.
Install forensic analysis software.
D.
Install forensic analysis software.
Answers
Suggested answer: C

Which of the following initiates the systems recovery phase of a disaster recovery plan?

A.
Issuing a formal disaster declaration
A.
Issuing a formal disaster declaration
Answers
B.
Activating the organization's hot site
B.
Activating the organization's hot site
Answers
C.
Evacuating the disaster site
C.
Evacuating the disaster site
Answers
D.
Assessing the extent of damage following the disaster
D.
Assessing the extent of damage following the disaster
Answers
Suggested answer: A

Which type of fire alarm system sensor is intended to detect fire at its earliest stage?

A.
Ionization
A.
Ionization
Answers
B.
Infrared
B.
Infrared
Answers
C.
Thermal
C.
Thermal
Answers
D.
Photoelectric
D.
Photoelectric
Answers
Suggested answer: A

An organization implements a Remote Access Server (RAS). Once users correct to the server, digital certificates are used to authenticate their identity. What type of Extensible Authentication Protocol (EAP) would the organization use dring this authentication?

A.
Transport layer security (TLS)
A.
Transport layer security (TLS)
Answers
B.
Message Digest 5 (MD5)
B.
Message Digest 5 (MD5)
Answers
C.
Lightweight Extensible Authentication Protocol (EAP)
C.
Lightweight Extensible Authentication Protocol (EAP)
Answers
D.
Subscriber Identity Module (SIM)
D.
Subscriber Identity Module (SIM)
Answers
Suggested answer: A

Which of the following MUST a security professional do in order to quantify the value of a security program to organization management?

A.
Report using metrics.
A.
Report using metrics.
Answers
B.
Rank priorities as high, medium, or low.
B.
Rank priorities as high, medium, or low.
Answers
C.
Communicate compliance obstacles.
C.
Communicate compliance obstacles.
Answers
D.
Report en employee activities
D.
Report en employee activities
Answers
Suggested answer: A
Total 1.482 questions
Go to page: of 149