ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 7

Question list
Search
Search

What is the BEST approach to addressing security issues in legacy web applications?

A.
Debug the security issues
A.
Debug the security issues
Answers
B.
Migrate to newer, supported applications where possible
B.
Migrate to newer, supported applications where possible
Answers
C.
Conduct a security assessment
C.
Conduct a security assessment
Answers
D.
Protect the legacy application with a web application firewall
D.
Protect the legacy application with a web application firewall
Answers
Suggested answer: D

Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?

A.
Check arguments in function calls
A.
Check arguments in function calls
Answers
B.
Test for the security patch level of the environment
B.
Test for the security patch level of the environment
Answers
C.
Include logging functions
C.
Include logging functions
Answers
D.
Digitally sign each application module
D.
Digitally sign each application module
Answers
Suggested answer: B

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

A.
Transparent Database Encryption (TDE)
A.
Transparent Database Encryption (TDE)
Answers
B.
Column level database encryption
B.
Column level database encryption
Answers
C.
Volume encryption
C.
Volume encryption
Answers
D.
Data tokenization
D.
Data tokenization
Answers
Suggested answer: D

Which of the following elements MUST a compliant EU-US Safe Harbor Privacy Policy contain?

A.
An of how long the data subject's collected information will be retained for and how it will be eventually disposed.
A.
An of how long the data subject's collected information will be retained for and how it will be eventually disposed.
Answers
B.
An of who can be contacted at the organization collecting the information if corrections are required by the data subject.
B.
An of who can be contacted at the organization collecting the information if corrections are required by the data subject.
Answers
C.
An of the regulatory frameworks and compliance standards the information collecting organization adheres to.
C.
An of the regulatory frameworks and compliance standards the information collecting organization adheres to.
Answers
D.
An of all the technologies employed by the collecting organization in gathering information on the data subject.
D.
An of all the technologies employed by the collecting organization in gathering information on the data subject.
Answers
Suggested answer: B

What is the MOST effective countermeasure to a malicious code attack against a mobile system?

A.
Sandbox
A.
Sandbox
Answers
B.
Change control
B.
Change control
Answers
C.
Memory management
C.
Memory management
Answers
D.
Public-Key Infrastructure (PKI)
D.
Public-Key Infrastructure (PKI)
Answers
Suggested answer: A

Which of the following is the BEST mitigation from phishing attacks?

A.
Network activity monitoring
A.
Network activity monitoring
Answers
B.
Security awareness training
B.
Security awareness training
Answers
C.
Corporate policy and procedures
C.
Corporate policy and procedures
Answers
D.
Strong file and directory permissions
D.
Strong file and directory permissions
Answers
Suggested answer: B

Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming?

A.
Anti-tampering
A.
Anti-tampering
Answers
B.
Secure card reader
B.
Secure card reader
Answers
C.
Radio Frequency (RF) scanner
C.
Radio Frequency (RF) scanner
Answers
D.
Intrusion Prevention System (IPS)
D.
Intrusion Prevention System (IPS)
Answers
Suggested answer: A

Which of the following is an essential element of a privileged identity lifecycle management?

A.
Regularly perform account re-validation and approval
A.
Regularly perform account re-validation and approval
Answers
B.
Account provisioning based on multi-factor authentication
B.
Account provisioning based on multi-factor authentication
Answers
C.
Frequently review performed activities and request justification
C.
Frequently review performed activities and request justification
Answers
D.
Account information to be provided by supervisor or line manager
D.
Account information to be provided by supervisor or line manager
Answers
Suggested answer: A

Which of the following is ensured when hashing files during chain of custody handling?

A.
Availability
A.
Availability
Answers
B.
Accountability
B.
Accountability
Answers
C.
Integrity
C.
Integrity
Answers
D.
Non-repudiation
D.
Non-repudiation
Answers
Suggested answer: C

Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?

A.
Cross Origin Resource Sharing (CORS)
A.
Cross Origin Resource Sharing (CORS)
Answers
B.
WebSockets
B.
WebSockets
Answers
C.
Document Object Model (DOM) trees
C.
Document Object Model (DOM) trees
Answers
D.
Web Interface Definition Language (IDL)
D.
Web Interface Definition Language (IDL)
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149