ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 85

Question list
Search
Search

List of questions

Search

Which of the following encryption types is used in Hash Message Authentication Code (HMAC) for key distribution?

A.
Symmetric
A.
Symmetric
Answers
B.
Asymmetric
B.
Asymmetric
Answers
C.
Ephemeral
C.
Ephemeral
Answers
D.
Permanent
D.
Permanent
Answers
Suggested answer: A

Explanation:

Reference: https://www.brainscape.com/flashcards/cryptography-message-integrity-6886698/packs/10957693

Compared with hardware cryptography, software cryptography is generally

A.
less expensive and slower.
A.
less expensive and slower.
Answers
B.
more expensive and faster.
B.
more expensive and faster.
Answers
C.
more expensive and slower.
C.
more expensive and slower.
Answers
D.
less expensive and faster.
D.
less expensive and faster.
Answers
Suggested answer: A

Explanation:

Reference: https://www.ontrack.com/uk/blog/making-data-simple/hardware-encryption-vssoftware-encryption-the-simple-guide/

A financial company has decided to move its main business application to the Cloud. The legal department objects, arguing that the move of the platform should comply with several regulatory obligations such as the General Data Protection (GDPR) and ensure data confidentiality. The Chief Information Security Officer (CISO) says that the cloud provider has met all regulations requirements and even provides its own encryption solution with internally-managed encryption keys to address data confidentiality. Did the CISO address all the legal requirements in this situation?

A.
No, because the encryption solution is internal to the cloud provider.
A.
No, because the encryption solution is internal to the cloud provider.
Answers
B.
Yes, because the cloud provider meets all regulations requirements.
B.
Yes, because the cloud provider meets all regulations requirements.
Answers
C.
Yes, because the cloud provider is GDPR compliant.
C.
Yes, because the cloud provider is GDPR compliant.
Answers
D.
No, because the cloud provider is not certified to host government data.
D.
No, because the cloud provider is not certified to host government data.
Answers
Suggested answer: B

An employee receives a promotion that entities them to access higher-level functions on the company's accounting system, as well as keeping their access to the previous system that is no longer needed or applicable. What is the name of the process that tries to remove this excess privilege?

A.
Access provisioning
A.
Access provisioning
Answers
B.
Segregation of Duties (SoD)
B.
Segregation of Duties (SoD)
Answers
C.
Access certification
C.
Access certification
Answers
D.
Access aggregation
D.
Access aggregation
Answers
Suggested answer: B

Which of the following is PRIMARILY adopted for ensuring the integrity of information is preserved?

A.
Data at rest protection
A.
Data at rest protection
Answers
B.
Transport Layer Security (TLS)
B.
Transport Layer Security (TLS)
Answers
C.
Role Based Access Control (RBAC)
C.
Role Based Access Control (RBAC)
Answers
D.
One-way encryption
D.
One-way encryption
Answers
Suggested answer: A

Why might a network administrator choose distributed virtual switches instead of stand-alone switches for network segmentation?

A.
To standardize on a single vendor
A.
To standardize on a single vendor
Answers
B.
To ensure isolation of management traffic
B.
To ensure isolation of management traffic
Answers
C.
To maximize data plane efficiency
C.
To maximize data plane efficiency
Answers
D.
To reduce the risk of configuration errors
D.
To reduce the risk of configuration errors
Answers
Suggested answer: C

An organization has implemented a new backup process which protects confidential data by encrypting the information stored on backup tapes. Which of the following is a MAJOR data confidentiality concern after the implementation of this new backup process?

A.
Tape backup rotation
A.
Tape backup rotation
Answers
B.
Pre-existing backup tapes
B.
Pre-existing backup tapes
Answers
C.
Tape backup compression
C.
Tape backup compression
Answers
D.
Backup tape storage location
D.
Backup tape storage location
Answers
Suggested answer: D

Organization A is adding a large collection of confidential data records that it received when it acquired Organization B to its data store. Many of the users and staff from Organization B are no longer available. Which of the following MUST

Organization A 0do to property classify and secure the acquired data?

A.
Assign data owners from Organization A to the acquired data.
A.
Assign data owners from Organization A to the acquired data.
Answers
B.
Create placeholder accounts that represent former users from Organization B.
B.
Create placeholder accounts that represent former users from Organization B.
Answers
C.
Archive audit records that refer to users from Organization A.
C.
Archive audit records that refer to users from Organization A.
Answers
D.
Change the data classification for data acquired from Organization B.
D.
Change the data classification for data acquired from Organization B.
Answers
Suggested answer: A

An organization has a short-term agreement with a public Cloud Service Provider (CSP). Which of the following BEST protects sensitive data once the agreement expires and the assets are reused?

A.
Recommended that the business data owners use continuous monitoring and analysis of applications to prevent data loss.
A.
Recommended that the business data owners use continuous monitoring and analysis of applications to prevent data loss.
Answers
B.
Recommend that the business data owners use internal encryption keys for data-at-rest and datain- transit to the storage environment.
B.
Recommend that the business data owners use internal encryption keys for data-at-rest and datain- transit to the storage environment.
Answers
C.
Use a contractual agreement to ensure the CSP wipes the data from the storage environment.
C.
Use a contractual agreement to ensure the CSP wipes the data from the storage environment.
Answers
D.
Use a National Institute of Standards and Technology (NIST) recommendation for wiping data on the storage environment.
D.
Use a National Institute of Standards and Technology (NIST) recommendation for wiping data on the storage environment.
Answers
Suggested answer: C

Which of the following techniques is effective to detect taps in fiber optic cables?

A.
Taking baseline signal level of the cable
A.
Taking baseline signal level of the cable
Answers
B.
Measuring signal through external oscillator solution devices
B.
Measuring signal through external oscillator solution devices
Answers
C.
Outlining electromagnetic field strength
C.
Outlining electromagnetic field strength
Answers
D.
Performing network vulnerability scanning
D.
Performing network vulnerability scanning
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149