ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 84

Question list
Search
Search

List of questions

Search

Which of the following would an internal technical security audit BEST validate?

A.
Whether managerial controls are in place
A.
Whether managerial controls are in place
Answers
B.
Support for security programs by executive management
B.
Support for security programs by executive management
Answers
C.
Appropriate third-party system hardening
C.
Appropriate third-party system hardening
Answers
D.
Implementation of changes to a system
D.
Implementation of changes to a system
Answers
Suggested answer: D

Which of the following processes has the PRIMARY purpose of identifying outdated software versions, missing patches, and lapsed system updates?

A.
Penetration testing
A.
Penetration testing
Answers
B.
Vulnerability management
B.
Vulnerability management
Answers
C.
Software Development Life Cycle (SDLC)
C.
Software Development Life Cycle (SDLC)
Answers
D.
Life cycle management
D.
Life cycle management
Answers
Suggested answer: B

Explanation:

Reference: https://resources.infosecinstitute.com/category/certificationstraining/cissp/domains/security-operations/vulnerability-and-patch-management/#gref

A development operations team would like to start building new applications delegating the cybersecurity responsibility as much as possible to the service provider. Which of the following environments BEST fits their need?

A.
Cloud Virtual Machines (VM)
A.
Cloud Virtual Machines (VM)
Answers
B.
Cloud application container within a Virtual Machine (VM)
B.
Cloud application container within a Virtual Machine (VM)
Answers
C.
On premises Virtual Machine (VM)
C.
On premises Virtual Machine (VM)
Answers
D.
Self-hosted Virtual Machine (VM)
D.
Self-hosted Virtual Machine (VM)
Answers
Suggested answer: A

Change management policies and procedures belong to which of the following types of controls?

A.
Directive
A.
Directive
Answers
B.
Detective
B.
Detective
Answers
C.
Corrective
C.
Corrective
Answers
D.
Preventative
D.
Preventative
Answers
Suggested answer: A

Explanation:

Reference:

https://books.google.com.pk/books?id=9gCn86CmsNQC&pg=PA570&lpg=PA570&dq=CISSP+Change+management+policies+and+procedures+belong+to+which+type+of+control&source=bl&ots=riGvVpUO4H&sig=ACfU3U0kRWWaIIj7gwqlovVku880wG5LOg&hl=en&sa=X&ved=2ahUKEwjA7cGL_anpAhULxoUKHc1lD3UQ6AEwCnoECBIQAQ#v=onepage&q=CISSP%20Change%20management%20policies%20and%20procedures%20belong%20to%20which%20type%20of%20control&f=false

What access control scheme uses fine-grained rules to specify the conditions under which access to each data item or applications is granted?

A.
Mandatory Access Control (MAC)
A.
Mandatory Access Control (MAC)
Answers
B.
Discretionary Access Control (DAC)
B.
Discretionary Access Control (DAC)
Answers
C.
Role Based Access Control (RBAC)
C.
Role Based Access Control (RBAC)
Answers
D.
Attribute Based Access Control (ABAC)
D.
Attribute Based Access Control (ABAC)
Answers
Suggested answer: D

Explanation:

Reference: https://en.wikipedia.org/wiki/Attribute-based_access_control

Why is planning the MOST critical phase of a Role Based Access Control (RBAC) implementation?

A.
The criteria for measuring risk is defined.
A.
The criteria for measuring risk is defined.
Answers
B.
User populations to be assigned to each role is determined.
B.
User populations to be assigned to each role is determined.
Answers
C.
Role mining to define common access patterns is performed.
C.
Role mining to define common access patterns is performed.
Answers
D.
The foundational criteria are defined.
D.
The foundational criteria are defined.
Answers
Suggested answer: B

Vulnerability scanners may allow for the administrator to assign which of the following in order to assist in prioritizing remediation activities?

A.
Definitions for each exposure type
A.
Definitions for each exposure type
Answers
B.
Vulnerability attack vectors
B.
Vulnerability attack vectors
Answers
C.
Asset values for networks
C.
Asset values for networks
Answers
D.
Exploit code metrics
D.
Exploit code metrics
Answers
Suggested answer: C

In order for application developers to detect potential vulnerabilities earlier during the Software Development Life Cycle (SDLC), which of the following safeguards should be implemented FIRST as part of a comprehensive testing framework?

A.
Source code review
A.
Source code review
Answers
B.
Acceptance testing
B.
Acceptance testing
Answers
C.
Threat modeling
C.
Threat modeling
Answers
D.
Automated testing
D.
Automated testing
Answers
Suggested answer: A

Physical assets defined in an organization's Business Impact Analysis (BIA) could include which of the following?

A.
Personal belongings of organizational staff members
A.
Personal belongings of organizational staff members
Answers
B.
Supplies kept off-site at a remote facility
B.
Supplies kept off-site at a remote facility
Answers
C.
Cloud-based applications
C.
Cloud-based applications
Answers
D.
Disaster Recovery (DR) line-item revenues
D.
Disaster Recovery (DR) line-item revenues
Answers
Suggested answer: B

What is the best way for mutual authentication of devices belonging to the same organization?

A.
Token
A.
Token
Answers
B.
Certificates
B.
Certificates
Answers
C.
User ID and passwords
C.
User ID and passwords
Answers
D.
Biometric
D.
Biometric
Answers
Suggested answer: A

Explanation:

Reference:

https://books.google.com.pk/books?id=bb0re6h8JPAC&pg=PA637&lpg=PA637&dq=CISSP+for+mutual+authentication+of+devices+belonging+to+the+same+organization&source=bl&ots=7VyomeF8Fj&sig=ACfU3U3ZoosKA_v0zOaW67NSffzcCR7sA&hl=en&sa=X&ved=2ahUKEwjq4o2TgKrpAhUQ9IUKHbGlAhwQ6AEwAHoECBEQAQ#v=onepage&q=CISSP%20for%20mutual%20authentication%20of%20devices%20belonging%20to%20the%20same%20organization&f=false

Total 1.482 questions
Go to page: of 149