ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 89

Question list
Search
Search

List of questions

Search

Which of the following value comparisons MOST accurately reflects the agile development approach?

A.
Processes and toots over individuals and interactions
A.
Processes and toots over individuals and interactions
Answers
B.
Contract negotiation over customer collaboration
B.
Contract negotiation over customer collaboration
Answers
C.
Following a plan over responding to change
C.
Following a plan over responding to change
Answers
D.
Working software over comprehensive documentation
D.
Working software over comprehensive documentation
Answers
Suggested answer: D

Which of the following needs to be included in order for High Availability (HA) to continue operations during planned system outages?

A.
Redundant hardware, disk spanning, and patching
A.
Redundant hardware, disk spanning, and patching
Answers
B.
Load balancing, power reserves, and disk spanning
B.
Load balancing, power reserves, and disk spanning
Answers
C.
Backups, clustering, and power reserves
C.
Backups, clustering, and power reserves
Answers
D.
Clustering, load balancing, and fault-tolerant options
D.
Clustering, load balancing, and fault-tolerant options
Answers
Suggested answer: D

Which of the following is the MOST effective countermeasure against Man-in-the Middle (MITM) attacks while using online banking?

A.
Transport Layer Security (TLS)
A.
Transport Layer Security (TLS)
Answers
B.
Secure Sockets Layer (SSL)
B.
Secure Sockets Layer (SSL)
Answers
C.
Pretty Good Privacy (PGP)
C.
Pretty Good Privacy (PGP)
Answers
D.
Secure Shell (SSH)
D.
Secure Shell (SSH)
Answers
Suggested answer: A

According to the Capability Maturity Model Integration (CMMI), which of the following levels is identified by a managed process that is tailored from the organization's set of standard processes according to the organization's tailoring guidelines?

A.
Level 0: Incomplete
A.
Level 0: Incomplete
Answers
B.
Level 1: Performed
B.
Level 1: Performed
Answers
C.
Level 2: Managed
C.
Level 2: Managed
Answers
D.
Level 3: Defined
D.
Level 3: Defined
Answers
Suggested answer: D

Point-to-Point Protocol (PPP) was designed to specifically address what issue?

A.
A common design flaw in telephone modems
A.
A common design flaw in telephone modems
Answers
B.
Speed and reliability issues between dial-up users and Internet Service Providers (ISP).
B.
Speed and reliability issues between dial-up users and Internet Service Providers (ISP).
Answers
C.
Compatibility issues with personal computers and web browsers
C.
Compatibility issues with personal computers and web browsers
Answers
D.
The security of dial-up connections to remote networks
D.
The security of dial-up connections to remote networks
Answers
Suggested answer: B

Which of the following is an advantage of' Secure Shell (SSH)?

A.
It operates at the network layer.
A.
It operates at the network layer.
Answers
B.
It encrypts transmitted User ID and passwords.
B.
It encrypts transmitted User ID and passwords.
Answers
C.
It uses challenge-response to authenticate each party.
C.
It uses challenge-response to authenticate each party.
Answers
D.
It uses the International Data Encryption Algorithm (IDEA) for data privacy.
D.
It uses the International Data Encryption Algorithm (IDEA) for data privacy.
Answers
Suggested answer: C

A security engineer is designing a Customer Relationship Management (CRM) application for a thirdparty vendor. In which phase of the System Development Life Cycle (SDLC) will it be MOST beneficial to conduct a data sensitivity assessment?

A.
Development / Acquisition
A.
Development / Acquisition
Answers
B.
Initiation
B.
Initiation
Answers
C.
Enumeration
C.
Enumeration
Answers
D.
Operation / Maintenance
D.
Operation / Maintenance
Answers
Suggested answer: B

Which of the following is a PRIMARY challenge when running a penetration test?

A.
Determining the cost
A.
Determining the cost
Answers
B.
Establishing a business case
B.
Establishing a business case
Answers
C.
Remediating found vulnerabilities
C.
Remediating found vulnerabilities
Answers
D.
Determining the depth of coverage
D.
Determining the depth of coverage
Answers
Suggested answer: D

Which one of the following would cause an immediate review and possible change to the security policies of an organization?

A.
Change in technology
A.
Change in technology
Answers
B.
Change in senior management
B.
Change in senior management
Answers
C.
Change to organization processes
C.
Change to organization processes
Answers
D.
Change to organization goals
D.
Change to organization goals
Answers
Suggested answer: D

An audit of an application reveals that the current configuration does not match the configuration of the originally implemented application. Which of the following is the FIRST action to be taken?

A.
Recommend an update to the change control process.
A.
Recommend an update to the change control process.
Answers
B.
Verify the approval of the configuration change.
B.
Verify the approval of the configuration change.
Answers
C.
Roll back the application to the original configuration.
C.
Roll back the application to the original configuration.
Answers
D.
Document the changes to the configuration.
D.
Document the changes to the configuration.
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149