ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 78

Question list
Search
Search

What is the MOST effective way to determine a mission critical asset in an organization?

A.
Vulnerability analysis
A.
Vulnerability analysis
Answers
B.
business process analysis
B.
business process analysis
Answers
C.
Threat analysis
C.
Threat analysis
Answers
D.
Business risk analysis
D.
Business risk analysis
Answers
Suggested answer: B

Information security metrics provide the GREATEST value tp management when based upon the security manager's knowledge of which of the following?

A.
Likelihood of a security breach
A.
Likelihood of a security breach
Answers
B.
Value of information assets
B.
Value of information assets
Answers
C.
Cost of implementing effective controls
C.
Cost of implementing effective controls
Answers
D.
Benefits related to quantitative analysts
D.
Benefits related to quantitative analysts
Answers
Suggested answer: B

Who determines the required level of independence for security control Assessors (SCA)?

A.
Business owner
A.
Business owner
Answers
B.
Authorizing Official (AO)
B.
Authorizing Official (AO)
Answers
C.
Chief Information Security Officer (CISC)
C.
Chief Information Security Officer (CISC)
Answers
D.
System owner
D.
System owner
Answers
Suggested answer: B

What high Availability (HA) option of database allows multiple clients to access multiple database servers simultaneously?

A.
Non-Structured Query Language (NoSQL) database
A.
Non-Structured Query Language (NoSQL) database
Answers
B.
Relational database
B.
Relational database
Answers
C.
Shadow database
C.
Shadow database
Answers
D.
Replicated database
D.
Replicated database
Answers
Suggested answer: C
A.
Verify the camera's log for recent logins outside of the Internet Technology (IT) department.
A.
Verify the camera's log for recent logins outside of the Internet Technology (IT) department.
Answers
B.
Verify the security and encryption protocol the camera uses.
B.
Verify the security and encryption protocol the camera uses.
Answers
C.
Verify the security camera requires authentication to log into the management console.
C.
Verify the security camera requires authentication to log into the management console.
Answers
D.
Verify the most recent firmware version is installed on the camera.
D.
Verify the most recent firmware version is installed on the camera.
Answers
Suggested answer: D

Which of the following is considered the last line defense in regard to a Governance, Risk managements, and compliance (GRC) program?

A.
Internal audit
A.
Internal audit
Answers
B.
Internal controls
B.
Internal controls
Answers
C.
Board review
C.
Board review
Answers
D.
Risk management
D.
Risk management
Answers
Suggested answer: B

Which of the following can be used to calculate the loss event probability?

A.
Total number of possible outcomes divided by frequency of outcomes
A.
Total number of possible outcomes divided by frequency of outcomes
Answers
B.
Number of outcomes divided by total number of possible outcomes
B.
Number of outcomes divided by total number of possible outcomes
Answers
C.
Number of outcomes multiplied by total number of possible outcomes
C.
Number of outcomes multiplied by total number of possible outcomes
Answers
D.
Total number of possible outcomes multiplied by frequency of outcomes
D.
Total number of possible outcomes multiplied by frequency of outcomes
Answers
Suggested answer: B

Which of the following is applicable to a publicly held company concerned about information handling and storage requirement specific to the financial reporting?

A.
Privacy Act of 1974
A.
Privacy Act of 1974
Answers
B.
Clinger-Cohan Act of 1996
B.
Clinger-Cohan Act of 1996
Answers
C.
Sarbanes-Oxley (SOX) Act of 2002
C.
Sarbanes-Oxley (SOX) Act of 2002
Answers
D.
International Organization for Standardization (ISO) 27001
D.
International Organization for Standardization (ISO) 27001
Answers
Suggested answer: C

Which of the following is used to detect steganography?

A.
Audio analysis
A.
Audio analysis
Answers
B.
Statistical analysis
B.
Statistical analysis
Answers
C.
Reverse engineering
C.
Reverse engineering
Answers
D.
Cryptanalysis
D.
Cryptanalysis
Answers
Suggested answer: C

Which is the MOST critical aspect of computer-generated evidence?

A.
Objectivity
A.
Objectivity
Answers
B.
Integrity
B.
Integrity
Answers
C.
Timeliness
C.
Timeliness
Answers
D.
Relevancy
D.
Relevancy
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149