ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 89

Question list
Search

List of questions

Search

Question 881

Report
Export
Collapse

Which of the following value comparisons MOST accurately reflects the agile development approach?

Processes and toots over individuals and interactions
Processes and toots over individuals and interactions
Contract negotiation over customer collaboration
Contract negotiation over customer collaboration
Following a plan over responding to change
Following a plan over responding to change
Working software over comprehensive documentation
Working software over comprehensive documentation
Suggested answer: D
asked 18/09/2024
Tyler Evans
38 questions

Question 882

Report
Export
Collapse

Which of the following needs to be included in order for High Availability (HA) to continue operations during planned system outages?

Redundant hardware, disk spanning, and patching
Redundant hardware, disk spanning, and patching
Load balancing, power reserves, and disk spanning
Load balancing, power reserves, and disk spanning
Backups, clustering, and power reserves
Backups, clustering, and power reserves
Clustering, load balancing, and fault-tolerant options
Clustering, load balancing, and fault-tolerant options
Suggested answer: D
asked 18/09/2024
Yohane Phompho
33 questions

Question 883

Report
Export
Collapse

Which of the following is the MOST effective countermeasure against Man-in-the Middle (MITM) attacks while using online banking?

Transport Layer Security (TLS)
Transport Layer Security (TLS)
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP)
Secure Shell (SSH)
Secure Shell (SSH)
Suggested answer: A
asked 18/09/2024
Leon Chukwuma
30 questions

Question 884

Report
Export
Collapse

According to the Capability Maturity Model Integration (CMMI), which of the following levels is identified by a managed process that is tailored from the organization's set of standard processes according to the organization's tailoring guidelines?

Level 0: Incomplete
Level 0: Incomplete
Level 1: Performed
Level 1: Performed
Level 2: Managed
Level 2: Managed
Level 3: Defined
Level 3: Defined
Suggested answer: D
asked 18/09/2024
Laura Archilla
36 questions

Question 885

Report
Export
Collapse

Point-to-Point Protocol (PPP) was designed to specifically address what issue?

A common design flaw in telephone modems
A common design flaw in telephone modems
Speed and reliability issues between dial-up users and Internet Service Providers (ISP).
Speed and reliability issues between dial-up users and Internet Service Providers (ISP).
Compatibility issues with personal computers and web browsers
Compatibility issues with personal computers and web browsers
The security of dial-up connections to remote networks
The security of dial-up connections to remote networks
Suggested answer: B
asked 18/09/2024
john wick
34 questions

Question 886

Report
Export
Collapse

Which of the following is an advantage of' Secure Shell (SSH)?

It operates at the network layer.
It operates at the network layer.
It encrypts transmitted User ID and passwords.
It encrypts transmitted User ID and passwords.
It uses challenge-response to authenticate each party.
It uses challenge-response to authenticate each party.
It uses the International Data Encryption Algorithm (IDEA) for data privacy.
It uses the International Data Encryption Algorithm (IDEA) for data privacy.
Suggested answer: C
asked 18/09/2024
Matteo Di Pomponio
41 questions

Question 887

Report
Export
Collapse

A security engineer is designing a Customer Relationship Management (CRM) application for a thirdparty vendor. In which phase of the System Development Life Cycle (SDLC) will it be MOST beneficial to conduct a data sensitivity assessment?

Development / Acquisition
Development / Acquisition
Initiation
Initiation
Enumeration
Enumeration
Operation / Maintenance
Operation / Maintenance
Suggested answer: B
asked 18/09/2024
Francesco Facco
29 questions

Question 888

Report
Export
Collapse

Which of the following is a PRIMARY challenge when running a penetration test?

Determining the cost
Determining the cost
Establishing a business case
Establishing a business case
Remediating found vulnerabilities
Remediating found vulnerabilities
Determining the depth of coverage
Determining the depth of coverage
Suggested answer: D
asked 18/09/2024
Vadym Popov
39 questions

Question 889

Report
Export
Collapse

Which one of the following would cause an immediate review and possible change to the security policies of an organization?

Change in technology
Change in technology
Change in senior management
Change in senior management
Change to organization processes
Change to organization processes
Change to organization goals
Change to organization goals
Suggested answer: D
asked 18/09/2024
Tyler Evans
38 questions

Question 890

Report
Export
Collapse

An audit of an application reveals that the current configuration does not match the configuration of the originally implemented application. Which of the following is the FIRST action to be taken?

Recommend an update to the change control process.
Recommend an update to the change control process.
Verify the approval of the configuration change.
Verify the approval of the configuration change.
Roll back the application to the original configuration.
Roll back the application to the original configuration.
Document the changes to the configuration.
Document the changes to the configuration.
Suggested answer: B
asked 18/09/2024
João Faria
36 questions
Total 1.482 questions
Go to page: of 149