ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 9

Question list
Search
Search

What principle requires that changes to the plaintext affect many parts of the ciphertext?

A.
Diffusion
A.
Diffusion
Answers
B.
Encapsulation
B.
Encapsulation
Answers
C.
Obfuscation
C.
Obfuscation
Answers
D.
Permutation
D.
Permutation
Answers
Suggested answer: A

Which one of these risk factors would be the LEAST important consideration in choosing a building site for a new computer facility?

A.
Vulnerability to crime
A.
Vulnerability to crime
Answers
B.
Adjacent buildings and businesses
B.
Adjacent buildings and businesses
Answers
C.
Proximity to an airline flight path
C.
Proximity to an airline flight path
Answers
D.
Vulnerability to natural disasters
D.
Vulnerability to natural disasters
Answers
Suggested answer: C

Which one of the following transmission media is MOST effective in preventing data interception?

A.
Microwave
A.
Microwave
Answers
B.
Twisted-pair
B.
Twisted-pair
Answers
C.
Fiber optic
C.
Fiber optic
Answers
D.
Coaxial cable
D.
Coaxial cable
Answers
Suggested answer: C

Which security action should be taken FIRST when computer personnel are terminated from their jobs?

A.
Remove their computer access
A.
Remove their computer access
Answers
B.
Require them to turn in their badge
B.
Require them to turn in their badge
Answers
C.
Conduct an exit interview
C.
Conduct an exit interview
Answers
D.
Reduce their physical access level to the facility
D.
Reduce their physical access level to the facility
Answers
Suggested answer: A

A practice that permits the owner of a data object to grant other users access to that object would usually provide

A.
Mandatory Access Control (MAC).
A.
Mandatory Access Control (MAC).
Answers
B.
owner-administered control.
B.
owner-administered control.
Answers
C.
owner-dependent access control.
C.
owner-dependent access control.
Answers
D.
Discretionary Access Control (DAC).
D.
Discretionary Access Control (DAC).
Answers
Suggested answer: D

The type of authorized interactions a subject can have with an object is

A.
control.
A.
control.
Answers
B.
permission.
B.
permission.
Answers
C.
procedure.
C.
procedure.
Answers
D.
protocol.
D.
protocol.
Answers
Suggested answer: B

Why MUST a Kerberos server be well protected from unauthorized access?

A.
It contains the keys of all clients.
A.
It contains the keys of all clients.
Answers
B.
It always operates at root privilege.
B.
It always operates at root privilege.
Answers
C.
It contains all the tickets for services.
C.
It contains all the tickets for services.
Answers
D.
It contains the Internet Protocol (IP) address of all network entities.
D.
It contains the Internet Protocol (IP) address of all network entities.
Answers
Suggested answer: A

Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router?

A.
Network Address Translation (NAT)
A.
Network Address Translation (NAT)
Answers
B.
Application Proxy
B.
Application Proxy
Answers
C.
Routing Information Protocol (RIP) Version 2
C.
Routing Information Protocol (RIP) Version 2
Answers
D.
Address Masking
D.
Address Masking
Answers
Suggested answer: A

While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?

A.
Trusted path
A.
Trusted path
Answers
B.
Malicious logic
B.
Malicious logic
Answers
C.
Social engineering
C.
Social engineering
Answers
D.
Passive misuse
D.
Passive misuse
Answers
Suggested answer: C

Why must all users be positively identified prior to using multi-user computers?

A.
To provide access to system privileges
A.
To provide access to system privileges
Answers
B.
To provide access to the operating system
B.
To provide access to the operating system
Answers
C.
To ensure that unauthorized persons cannot access the computers
C.
To ensure that unauthorized persons cannot access the computers
Answers
D.
To ensure that management knows what users are currently logged on
D.
To ensure that management knows what users are currently logged on
Answers
Suggested answer: C
Total 1.482 questions
Go to page: of 149