ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 69

Question list
Search
Search

A client has reviewed a vulnerability assessment report and has stated it is Inaccurate. The client states that the vulnerabilities listed are not valid because the host's Operating System (OS) was not properly detected.

Where in the vulnerability assessment process did the erra MOST likely occur?

A.
Detection
A.
Detection
Answers
B.
Enumeration
B.
Enumeration
Answers
C.
Reporting
C.
Reporting
Answers
D.
Discovery
D.
Discovery
Answers
Suggested answer: A

Which of the following objects should be removed FIRST prior to uploading code to public code repositories?

A.
Security credentials
A.
Security credentials
Answers
B.
Known vulnerabilities
B.
Known vulnerabilities
Answers
C.
Inefficient algorithms
C.
Inefficient algorithms
Answers
D.
Coding mistakes
D.
Coding mistakes
Answers
Suggested answer: A

Which of the following is a common measure within a Local Area Network (LAN) to provide en additional level of security through segmentation?

A.
Building Virtual Local Area Networks (VLAN)
A.
Building Virtual Local Area Networks (VLAN)
Answers
B.
Building Demilitarized Zones (DMZ)
B.
Building Demilitarized Zones (DMZ)
Answers
C.
Implementing a virus scanner
C.
Implementing a virus scanner
Answers
D.
Implementing an Intrusion Detection System (IDS)
D.
Implementing an Intrusion Detection System (IDS)
Answers
Suggested answer: A

What Is the FIRST step for a digital investigator to perform when using best practices to collect digital evidence from a potential crime scene?

A.
Consult the lead investigate to team the details of the case and required evidence.
A.
Consult the lead investigate to team the details of the case and required evidence.
Answers
B.
Assure that grounding procedures have been followed to reduce the loss of digital data due to static electricity discharge.
B.
Assure that grounding procedures have been followed to reduce the loss of digital data due to static electricity discharge.
Answers
C.
Update the Basic Input Output System (BIOS) and Operating System (OS) of any tools used to assure evidence admissibility.
C.
Update the Basic Input Output System (BIOS) and Operating System (OS) of any tools used to assure evidence admissibility.
Answers
D.
Confirm that the appropriate warrants were issued to the subject of the investigation to eliminate illegal search claims.
D.
Confirm that the appropriate warrants were issued to the subject of the investigation to eliminate illegal search claims.
Answers
Suggested answer: D

How can an attacker exploit overflow to execute arbitrary code?

A.
Modify a function's return address.
A.
Modify a function's return address.
Answers
B.
Alter the address of the stack.
B.
Alter the address of the stack.
Answers
C.
Substitute elements in the stack.
C.
Substitute elements in the stack.
Answers
D.
Move the stack pointer.
D.
Move the stack pointer.
Answers
Suggested answer: A

Which of the following is TRUE regarding equivalence class testing?

A.
It is characterized by the stateless behavior of a process implemented In a function.
A.
It is characterized by the stateless behavior of a process implemented In a function.
Answers
B.
An entire partition can be covered by considering only one representative value from that partition.
B.
An entire partition can be covered by considering only one representative value from that partition.
Answers
C.
Test inputs are obtained from the derived boundaries of the given functional specifications.
C.
Test inputs are obtained from the derived boundaries of the given functional specifications.
Answers
D.
It is useful for testing communications protocols and graphical user interfaces.
D.
It is useful for testing communications protocols and graphical user interfaces.
Answers
Suggested answer: C

Which of the following is the BEST way to protect against structured Query language (SQL) injection?

A.
Enforce boundary checking.
A.
Enforce boundary checking.
Answers
B.
Restrict use of SELECT command.
B.
Restrict use of SELECT command.
Answers
C.
Restrict Hyper Text Markup Language (HTNL) source code access.
C.
Restrict Hyper Text Markup Language (HTNL) source code access.
Answers
D.
Use stored procedures.
D.
Use stored procedures.
Answers
Suggested answer: D

Which of the following BEST describes the responsibilities of data owner?

A.
Ensuing Quality and validation trough periodic audits for ongoing data integrity
A.
Ensuing Quality and validation trough periodic audits for ongoing data integrity
Answers
B.
Determining the impact the information has on the mission of the organization
B.
Determining the impact the information has on the mission of the organization
Answers
C.
Maintaining fundamental data availability, including data storage and archiving
C.
Maintaining fundamental data availability, including data storage and archiving
Answers
D.
Ensuring accessibility to appropriate users, maintaining appropriate levels of data security
D.
Ensuring accessibility to appropriate users, maintaining appropriate levels of data security
Answers
Suggested answer: B

Which area of embedded devices are most commonly attacked?

A.
Application
A.
Application
Answers
B.
Firmware
B.
Firmware
Answers
C.
Protocol
C.
Protocol
Answers
D.
Physical Interface
D.
Physical Interface
Answers
Suggested answer: A

If virus infection is suspected, which of the following is the FIRST step for the user to take?

A.
Unplug the computer from the network.
A.
Unplug the computer from the network.
Answers
B.
Save the opened files and shutdown the computer.
B.
Save the opened files and shutdown the computer.
Answers
C.
Report the incident to service desk.
C.
Report the incident to service desk.
Answers
D.
Update the antivirus to the latest version.
D.
Update the antivirus to the latest version.
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149