ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 87

Question list
Search
Search

Which of the following provides the BEST method to verify that security baseline configurations are maintained?

A.
Perform regular system security testing.
A.
Perform regular system security testing.
Answers
B.
Design security early in the development cycle.
B.
Design security early in the development cycle.
Answers
C.
Analyze logs to determine user activities.
C.
Analyze logs to determine user activities.
Answers
D.
Perform quarterly risk assessments.
D.
Perform quarterly risk assessments.
Answers
Suggested answer: A

Which attack defines a piece of code that is inserted into software to trigger a malicious function?

A.
Phishing
A.
Phishing
Answers
B.
Salami
B.
Salami
Answers
C.
Back door
C.
Back door
Answers
D.
Logic bomb
D.
Logic bomb
Answers
Suggested answer: D

Which of the following is the MOST critical success factor in the security patch management process?

A.
Tracking and reporting on inventory
A.
Tracking and reporting on inventory
Answers
B.
Supporting documentation
B.
Supporting documentation
Answers
C.
Management review of reports
C.
Management review of reports
Answers
D.
Risk and impact analysis
D.
Risk and impact analysis
Answers
Suggested answer: A

A security professional should consider the protection of which of the following elements FIRST when developing a defense-in-depth strategy for a mobile workforce?

A.
Network perimeters
A.
Network perimeters
Answers
B.
Demilitarized Zones (DM2)
B.
Demilitarized Zones (DM2)
Answers
C.
Databases and back-end servers
C.
Databases and back-end servers
Answers
D.
End-user devices
D.
End-user devices
Answers
Suggested answer: D

Which of the following is the BEST technique to facilitate secure software development?

A.
Adhere to secure coding practices for the software application under development.
A.
Adhere to secure coding practices for the software application under development.
Answers
B.
Conduct penetrating testing for the software application under development.
B.
Conduct penetrating testing for the software application under development.
Answers
C.
Develop a threat modeling review for the software application under development.
C.
Develop a threat modeling review for the software application under development.
Answers
D.
Perform a code review process for the software application under development.
D.
Perform a code review process for the software application under development.
Answers
Suggested answer: A

What is the MAIN reason to ensure the appropriate retention periods are enforced for data stored on electronic media?

A.
To reduce the carbon footprint by eliminating paper
A.
To reduce the carbon footprint by eliminating paper
Answers
B.
To create an inventory of data assets stored on disk for backup and recovery
B.
To create an inventory of data assets stored on disk for backup and recovery
Answers
C.
To declassify information that has been improperly classified
C.
To declassify information that has been improperly classified
Answers
D.
To reduce the risk of loss, unauthorized access, use, modification, and disclosure
D.
To reduce the risk of loss, unauthorized access, use, modification, and disclosure
Answers
Suggested answer: D

For a federated identity solution, a third-party Identity Provider (IdP) is PRIMARILY responsible for which of the following?

A.
Access Control
A.
Access Control
Answers
B.
Account Management
B.
Account Management
Answers
C.
Authentication
C.
Authentication
Answers
D.
Authorization
D.
Authorization
Answers
Suggested answer: C

What is the BEST way to correlate large volumes of disparate data sources in a Security Operations Center (SOC) environment?

A.
Implement Intrusion Detection System (IDS).
A.
Implement Intrusion Detection System (IDS).
Answers
B.
Implement a Security Information and Event Management (SIEM) system.
B.
Implement a Security Information and Event Management (SIEM) system.
Answers
C.
Hire a team of analysts to consolidate data and generate reports.
C.
Hire a team of analysts to consolidate data and generate reports.
Answers
D.
Outsource the management of the SOC.
D.
Outsource the management of the SOC.
Answers
Suggested answer: B

Which of the following steps should be conducted during the FIRST phase of software assurance in a generic acquisition process?

A.
Establishing and consenting to the contract work schedule
A.
Establishing and consenting to the contract work schedule
Answers
B.
Issuing a Request for proposal (RFP) with a work statement
B.
Issuing a Request for proposal (RFP) with a work statement
Answers
C.
Developing software requirements to be included in work statement
C.
Developing software requirements to be included in work statement
Answers
D.
Reviewing and accepting software deliverables
D.
Reviewing and accepting software deliverables
Answers
Suggested answer: C

Assume that a computer was powered off when an information security professional arrived at a crime scene. Which of the following actions should be performed after the crime scene is isolated?

A.
Turn the computer on and collect volatile data.
A.
Turn the computer on and collect volatile data.
Answers
B.
Turn the computer on and collect network information.
B.
Turn the computer on and collect network information.
Answers
C.
Leave the computer off and prepare the computer for transportation to the laboratory
C.
Leave the computer off and prepare the computer for transportation to the laboratory
Answers
D.
Remove the hard drive, prepare it for transportation, and leave the hardware ta the scene.
D.
Remove the hard drive, prepare it for transportation, and leave the hardware ta the scene.
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149