ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 69

Question list
Search
Search

Question 681

Report
Export
Collapse

A client has reviewed a vulnerability assessment report and has stated it is Inaccurate. The client states that the vulnerabilities listed are not valid because the host's Operating System (OS) was not properly detected.

Where in the vulnerability assessment process did the erra MOST likely occur?

A.
Detection
A.
Detection
Answers
B.
Enumeration
B.
Enumeration
Answers
C.
Reporting
C.
Reporting
Answers
D.
Discovery
D.
Discovery
Answers
Suggested answer: A
asked 18/09/2024
Alejandro Meza
33 questions

Question 682

Report
Export
Collapse

Which of the following objects should be removed FIRST prior to uploading code to public code repositories?

A.
Security credentials
A.
Security credentials
Answers
B.
Known vulnerabilities
B.
Known vulnerabilities
Answers
C.
Inefficient algorithms
C.
Inefficient algorithms
Answers
D.
Coding mistakes
D.
Coding mistakes
Answers
Suggested answer: A
asked 18/09/2024
Cesar Castillo
31 questions

Question 683

Report
Export
Collapse

Which of the following is a common measure within a Local Area Network (LAN) to provide en additional level of security through segmentation?

A.
Building Virtual Local Area Networks (VLAN)
A.
Building Virtual Local Area Networks (VLAN)
Answers
B.
Building Demilitarized Zones (DMZ)
B.
Building Demilitarized Zones (DMZ)
Answers
C.
Implementing a virus scanner
C.
Implementing a virus scanner
Answers
D.
Implementing an Intrusion Detection System (IDS)
D.
Implementing an Intrusion Detection System (IDS)
Answers
Suggested answer: A
asked 18/09/2024
Prakhar Sengar
33 questions

Question 684

Report
Export
Collapse

What Is the FIRST step for a digital investigator to perform when using best practices to collect digital evidence from a potential crime scene?

A.
Consult the lead investigate to team the details of the case and required evidence.
A.
Consult the lead investigate to team the details of the case and required evidence.
Answers
B.
Assure that grounding procedures have been followed to reduce the loss of digital data due to static electricity discharge.
B.
Assure that grounding procedures have been followed to reduce the loss of digital data due to static electricity discharge.
Answers
C.
Update the Basic Input Output System (BIOS) and Operating System (OS) of any tools used to assure evidence admissibility.
C.
Update the Basic Input Output System (BIOS) and Operating System (OS) of any tools used to assure evidence admissibility.
Answers
D.
Confirm that the appropriate warrants were issued to the subject of the investigation to eliminate illegal search claims.
D.
Confirm that the appropriate warrants were issued to the subject of the investigation to eliminate illegal search claims.
Answers
Suggested answer: D
asked 18/09/2024
jeffrey rowland
30 questions

Question 685

Report
Export
Collapse

How can an attacker exploit overflow to execute arbitrary code?

A.
Modify a function's return address.
A.
Modify a function's return address.
Answers
B.
Alter the address of the stack.
B.
Alter the address of the stack.
Answers
C.
Substitute elements in the stack.
C.
Substitute elements in the stack.
Answers
D.
Move the stack pointer.
D.
Move the stack pointer.
Answers
Suggested answer: A
asked 18/09/2024
Robert Fox
50 questions

Question 686

Report
Export
Collapse

Which of the following is TRUE regarding equivalence class testing?

A.
It is characterized by the stateless behavior of a process implemented In a function.
A.
It is characterized by the stateless behavior of a process implemented In a function.
Answers
B.
An entire partition can be covered by considering only one representative value from that partition.
B.
An entire partition can be covered by considering only one representative value from that partition.
Answers
C.
Test inputs are obtained from the derived boundaries of the given functional specifications.
C.
Test inputs are obtained from the derived boundaries of the given functional specifications.
Answers
D.
It is useful for testing communications protocols and graphical user interfaces.
D.
It is useful for testing communications protocols and graphical user interfaces.
Answers
Suggested answer: C
asked 18/09/2024
Charly Ndedi Priso
35 questions

Question 687

Report
Export
Collapse

Which of the following is the BEST way to protect against structured Query language (SQL) injection?

A.
Enforce boundary checking.
A.
Enforce boundary checking.
Answers
B.
Restrict use of SELECT command.
B.
Restrict use of SELECT command.
Answers
C.
Restrict Hyper Text Markup Language (HTNL) source code access.
C.
Restrict Hyper Text Markup Language (HTNL) source code access.
Answers
D.
Use stored procedures.
D.
Use stored procedures.
Answers
Suggested answer: D
asked 18/09/2024
Mahmoud Ismail
34 questions

Question 688

Report
Export
Collapse

Which of the following BEST describes the responsibilities of data owner?

A.
Ensuing Quality and validation trough periodic audits for ongoing data integrity
A.
Ensuing Quality and validation trough periodic audits for ongoing data integrity
Answers
B.
Determining the impact the information has on the mission of the organization
B.
Determining the impact the information has on the mission of the organization
Answers
C.
Maintaining fundamental data availability, including data storage and archiving
C.
Maintaining fundamental data availability, including data storage and archiving
Answers
D.
Ensuring accessibility to appropriate users, maintaining appropriate levels of data security
D.
Ensuring accessibility to appropriate users, maintaining appropriate levels of data security
Answers
Suggested answer: B
asked 18/09/2024
Arun kumar
37 questions

Question 689

Report
Export
Collapse

Which area of embedded devices are most commonly attacked?

A.
Application
A.
Application
Answers
B.
Firmware
B.
Firmware
Answers
C.
Protocol
C.
Protocol
Answers
D.
Physical Interface
D.
Physical Interface
Answers
Suggested answer: A
asked 18/09/2024
Kina Collins
37 questions

Question 690

Report
Export
Collapse

If virus infection is suspected, which of the following is the FIRST step for the user to take?

A.
Unplug the computer from the network.
A.
Unplug the computer from the network.
Answers
B.
Save the opened files and shutdown the computer.
B.
Save the opened files and shutdown the computer.
Answers
C.
Report the incident to service desk.
C.
Report the incident to service desk.
Answers
D.
Update the antivirus to the latest version.
D.
Update the antivirus to the latest version.
Answers
Suggested answer: C
asked 18/09/2024
Michael Encarnado
34 questions
Total 1.482 questions
Go to page: of 149