ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 9

List of questions

Question 81

Report Export Collapse

What principle requires that changes to the plaintext affect many parts of the ciphertext?

Diffusion
Diffusion
Encapsulation
Encapsulation
Obfuscation
Obfuscation
Permutation
Permutation
Suggested answer: A
asked 18/09/2024
javier mungaray
43 questions

Question 82

Report Export Collapse

Which one of these risk factors would be the LEAST important consideration in choosing a building site for a new computer facility?

Vulnerability to crime
Vulnerability to crime
Adjacent buildings and businesses
Adjacent buildings and businesses
Proximity to an airline flight path
Proximity to an airline flight path
Vulnerability to natural disasters
Vulnerability to natural disasters
Suggested answer: C
asked 18/09/2024
Stefan Denić
28 questions

Question 83

Report Export Collapse

Which one of the following transmission media is MOST effective in preventing data interception?

Microwave
Microwave
Twisted-pair
Twisted-pair
Fiber optic
Fiber optic
Coaxial cable
Coaxial cable
Suggested answer: C
asked 18/09/2024
Carlos Eduardo Araujo Fonseca
43 questions

Question 84

Report Export Collapse

Which security action should be taken FIRST when computer personnel are terminated from their jobs?

Remove their computer access
Remove their computer access
Require them to turn in their badge
Require them to turn in their badge
Conduct an exit interview
Conduct an exit interview
Reduce their physical access level to the facility
Reduce their physical access level to the facility
Suggested answer: A
asked 18/09/2024
Matteo Di Pomponio
43 questions

Question 85

Report Export Collapse

A practice that permits the owner of a data object to grant other users access to that object would usually provide

Mandatory Access Control (MAC).
Mandatory Access Control (MAC).
owner-administered control.
owner-administered control.
owner-dependent access control.
owner-dependent access control.
Discretionary Access Control (DAC).
Discretionary Access Control (DAC).
Suggested answer: D
asked 18/09/2024
Olga Trofimova
39 questions

Question 86

Report Export Collapse

The type of authorized interactions a subject can have with an object is

control.
control.
permission.
permission.
procedure.
procedure.
protocol.
protocol.
Suggested answer: B
asked 18/09/2024
Alejandro Yepez
51 questions

Question 87

Report Export Collapse

Why MUST a Kerberos server be well protected from unauthorized access?

It contains the keys of all clients.
It contains the keys of all clients.
It always operates at root privilege.
It always operates at root privilege.
It contains all the tickets for services.
It contains all the tickets for services.
It contains the Internet Protocol (IP) address of all network entities.
It contains the Internet Protocol (IP) address of all network entities.
Suggested answer: A
asked 18/09/2024
Fahrurrazi .
29 questions

Question 88

Report Export Collapse

Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router?

Network Address Translation (NAT)
Network Address Translation (NAT)
Application Proxy
Application Proxy
Routing Information Protocol (RIP) Version 2
Routing Information Protocol (RIP) Version 2
Address Masking
Address Masking
Suggested answer: A
asked 18/09/2024
Kazi Basit
45 questions

Question 89

Report Export Collapse

While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?

Trusted path
Trusted path
Malicious logic
Malicious logic
Social engineering
Social engineering
Passive misuse
Passive misuse
Suggested answer: C
asked 18/09/2024
Elizabeth Holland
44 questions

Question 90

Report Export Collapse

Why must all users be positively identified prior to using multi-user computers?

To provide access to system privileges
To provide access to system privileges
To provide access to the operating system
To provide access to the operating system
To ensure that unauthorized persons cannot access the computers
To ensure that unauthorized persons cannot access the computers
To ensure that management knows what users are currently logged on
To ensure that management knows what users are currently logged on
Suggested answer: C
asked 18/09/2024
Dennis Valencia
39 questions
Total 1.482 questions
Go to page: of 149