ExamGecko
Home Home / ISC / CISSP
Ask QuestionAsk Question

ISC CISSP Practice Test - Questions Answers, Page 7

Question list
Search
Search

Question 61

Report
Export
Collapse

What is the BEST approach to addressing security issues in legacy web applications?

A.
Debug the security issues
A.
Debug the security issues
Answers
B.
Migrate to newer, supported applications where possible
B.
Migrate to newer, supported applications where possible
Answers
C.
Conduct a security assessment
C.
Conduct a security assessment
Answers
D.
Protect the legacy application with a web application firewall
D.
Protect the legacy application with a web application firewall
Answers
Suggested answer: D
asked 18/09/2024
Henri Sanrame
35 questions

Question 62

Report
Export
Collapse

Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?

A.
Check arguments in function calls
A.
Check arguments in function calls
Answers
B.
Test for the security patch level of the environment
B.
Test for the security patch level of the environment
Answers
C.
Include logging functions
C.
Include logging functions
Answers
D.
Digitally sign each application module
D.
Digitally sign each application module
Answers
Suggested answer: B
asked 18/09/2024
Mahdi Far
32 questions

Question 63

Report
Export
Collapse

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

A.
Transparent Database Encryption (TDE)
A.
Transparent Database Encryption (TDE)
Answers
B.
Column level database encryption
B.
Column level database encryption
Answers
C.
Volume encryption
C.
Volume encryption
Answers
D.
Data tokenization
D.
Data tokenization
Answers
Suggested answer: D
asked 18/09/2024
Katrina Allangba
40 questions

Question 64

Report
Export
Collapse

Which of the following elements MUST a compliant EU-US Safe Harbor Privacy Policy contain?

A.
An of how long the data subject's collected information will be retained for and how it will be eventually disposed.
A.
An of how long the data subject's collected information will be retained for and how it will be eventually disposed.
Answers
B.
An of who can be contacted at the organization collecting the information if corrections are required by the data subject.
B.
An of who can be contacted at the organization collecting the information if corrections are required by the data subject.
Answers
C.
An of the regulatory frameworks and compliance standards the information collecting organization adheres to.
C.
An of the regulatory frameworks and compliance standards the information collecting organization adheres to.
Answers
D.
An of all the technologies employed by the collecting organization in gathering information on the data subject.
D.
An of all the technologies employed by the collecting organization in gathering information on the data subject.
Answers
Suggested answer: B
asked 18/09/2024
Robert Endicott
45 questions

Question 65

Report
Export
Collapse

What is the MOST effective countermeasure to a malicious code attack against a mobile system?

A.
Sandbox
A.
Sandbox
Answers
B.
Change control
B.
Change control
Answers
C.
Memory management
C.
Memory management
Answers
D.
Public-Key Infrastructure (PKI)
D.
Public-Key Infrastructure (PKI)
Answers
Suggested answer: A
asked 18/09/2024
mustapha amraui
38 questions

Question 66

Report
Export
Collapse

Which of the following is the BEST mitigation from phishing attacks?

A.
Network activity monitoring
A.
Network activity monitoring
Answers
B.
Security awareness training
B.
Security awareness training
Answers
C.
Corporate policy and procedures
C.
Corporate policy and procedures
Answers
D.
Strong file and directory permissions
D.
Strong file and directory permissions
Answers
Suggested answer: B
asked 18/09/2024
Matthew Wagner
30 questions

Question 67

Report
Export
Collapse

Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming?

A.
Anti-tampering
A.
Anti-tampering
Answers
B.
Secure card reader
B.
Secure card reader
Answers
C.
Radio Frequency (RF) scanner
C.
Radio Frequency (RF) scanner
Answers
D.
Intrusion Prevention System (IPS)
D.
Intrusion Prevention System (IPS)
Answers
Suggested answer: A
asked 18/09/2024
Thomas Schmitt
42 questions

Question 68

Report
Export
Collapse

Which of the following is an essential element of a privileged identity lifecycle management?

A.
Regularly perform account re-validation and approval
A.
Regularly perform account re-validation and approval
Answers
B.
Account provisioning based on multi-factor authentication
B.
Account provisioning based on multi-factor authentication
Answers
C.
Frequently review performed activities and request justification
C.
Frequently review performed activities and request justification
Answers
D.
Account information to be provided by supervisor or line manager
D.
Account information to be provided by supervisor or line manager
Answers
Suggested answer: A
asked 18/09/2024
Morris Djavaheri
29 questions

Question 69

Report
Export
Collapse

Which of the following is ensured when hashing files during chain of custody handling?

A.
Availability
A.
Availability
Answers
B.
Accountability
B.
Accountability
Answers
C.
Integrity
C.
Integrity
Answers
D.
Non-repudiation
D.
Non-repudiation
Answers
Suggested answer: C
asked 18/09/2024
Olive Wang
39 questions

Question 70

Report
Export
Collapse

Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?

A.
Cross Origin Resource Sharing (CORS)
A.
Cross Origin Resource Sharing (CORS)
Answers
B.
WebSockets
B.
WebSockets
Answers
C.
Document Object Model (DOM) trees
C.
Document Object Model (DOM) trees
Answers
D.
Web Interface Definition Language (IDL)
D.
Web Interface Definition Language (IDL)
Answers
Suggested answer: B
asked 18/09/2024
Jessy Kevin NGANE OBAME
32 questions
Total 1.482 questions
Go to page: of 149