ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 85

List of questions

Question 841

Report Export Collapse

Which of the following encryption types is used in Hash Message Authentication Code (HMAC) for key distribution?

Become a Premium Member for full access
  Unlock Premium Member

Question 842

Report Export Collapse

Compared with hardware cryptography, software cryptography is generally

Become a Premium Member for full access
  Unlock Premium Member

Question 843

Report Export Collapse

A financial company has decided to move its main business application to the Cloud. The legal department objects, arguing that the move of the platform should comply with several regulatory obligations such as the General Data Protection (GDPR) and ensure data confidentiality. The Chief Information Security Officer (CISO) says that the cloud provider has met all regulations requirements and even provides its own encryption solution with internally-managed encryption keys to address data confidentiality. Did the CISO address all the legal requirements in this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 844

Report Export Collapse

An employee receives a promotion that entities them to access higher-level functions on the company's accounting system, as well as keeping their access to the previous system that is no longer needed or applicable. What is the name of the process that tries to remove this excess privilege?

Become a Premium Member for full access
  Unlock Premium Member

Question 845

Report Export Collapse

Which of the following is PRIMARILY adopted for ensuring the integrity of information is preserved?

Become a Premium Member for full access
  Unlock Premium Member

Question 846

Report Export Collapse

Why might a network administrator choose distributed virtual switches instead of stand-alone switches for network segmentation?

Become a Premium Member for full access
  Unlock Premium Member

Question 847

Report Export Collapse

An organization has implemented a new backup process which protects confidential data by encrypting the information stored on backup tapes. Which of the following is a MAJOR data confidentiality concern after the implementation of this new backup process?

Become a Premium Member for full access
  Unlock Premium Member

Question 848

Report Export Collapse

Organization A is adding a large collection of confidential data records that it received when it acquired Organization B to its data store. Many of the users and staff from Organization B are no longer available. Which of the following MUST

Organization A 0do to property classify and secure the acquired data?

Become a Premium Member for full access
  Unlock Premium Member

Question 849

Report Export Collapse

An organization has a short-term agreement with a public Cloud Service Provider (CSP). Which of the following BEST protects sensitive data once the agreement expires and the assets are reused?

Become a Premium Member for full access
  Unlock Premium Member

Question 850

Report Export Collapse

Which of the following techniques is effective to detect taps in fiber optic cables?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search