ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 91

Question list
Search
Search

Question 901

Report
Export
Collapse

Which of the following models uses unique groups contained in unique conflict classes?

A.
Chinese Wall
A.
Chinese Wall
Answers
B.
Bell-LaPadula
B.
Bell-LaPadula
Answers
C.
Clark-Wilson
C.
Clark-Wilson
Answers
D.
Biba
D.
Biba
Answers
Suggested answer: C
asked 18/09/2024
victoria nagy
37 questions

Question 902

Report
Export
Collapse

When developing the entitlement review process, which of the following roles is responsible for determining who has a need for the information?

A.
Data Custodian
A.
Data Custodian
Answers
B.
Data Owner
B.
Data Owner
Answers
C.
Database Administrator
C.
Database Administrator
Answers
D.
Information Technology (IT) Director
D.
Information Technology (IT) Director
Answers
Suggested answer: B
asked 18/09/2024
Brian Lester
33 questions

Question 903

Report
Export
Collapse

What should an auditor do when conducting a periodic audit on media retention?

A.
Check electronic storage media to ensure records are not retained past their destruction date.
A.
Check electronic storage media to ensure records are not retained past their destruction date.
Answers
B.
Ensure authorized personnel are in possession of paper copies containing Personally Identifiable Information....
B.
Ensure authorized personnel are in possession of paper copies containing Personally Identifiable Information....
Answers
C.
Check that hard disks containing backup data that are still within a retention cycle are being destroyed....
C.
Check that hard disks containing backup data that are still within a retention cycle are being destroyed....
Answers
D.
Ensure that data shared with outside organizations is no longer on a retention schedule.
D.
Ensure that data shared with outside organizations is no longer on a retention schedule.
Answers
Suggested answer: A
asked 18/09/2024
Cornelius Paul
37 questions

Question 904

Report
Export
Collapse

Which of the following factors is á PRIMARY reason to drive changes in an Information Security Continuous Monitoring (ISCM) strategy?

A.
Testing and Evaluation (TE) personnel changes
A.
Testing and Evaluation (TE) personnel changes
Answers
B.
Changes to core missions or business processes
B.
Changes to core missions or business processes
Answers
C.
Increased Cross-Site Request Forgery (CSRF) attacks
C.
Increased Cross-Site Request Forgery (CSRF) attacks
Answers
D.
Changes in Service Organization Control (SOC) 2 reporting requirements
D.
Changes in Service Organization Control (SOC) 2 reporting requirements
Answers
Suggested answer: B
asked 18/09/2024
Srecka Kovacevic
39 questions

Question 905

Report
Export
Collapse

Digital non-repudiation requires which of the following?

A.
A trusted third-party
A.
A trusted third-party
Answers
B.
Appropriate corporate policies
B.
Appropriate corporate policies
Answers
C.
Symmetric encryption
C.
Symmetric encryption
Answers
D.
Multifunction access cards
D.
Multifunction access cards
Answers
Suggested answer: A
asked 18/09/2024
Nathalie Agustin
36 questions

Question 906

Report
Export
Collapse

Data remanence is the biggest threat in which of the following scenarios?

A.
A physical disk drive has been overwritten and reused within a datacenter.
A.
A physical disk drive has been overwritten and reused within a datacenter.
Answers
B.
A physical disk drive has been degaussed, verified, and released to a third party for dest....
B.
A physical disk drive has been degaussed, verified, and released to a third party for dest....
Answers
C.
A flash drive has been overwritten, verified, and reused within a datacenter.
C.
A flash drive has been overwritten, verified, and reused within a datacenter.
Answers
D.
A flash drive has been overwritten and released to a third party for destruction.
D.
A flash drive has been overwritten and released to a third party for destruction.
Answers
Suggested answer: D
asked 18/09/2024
OZana Monce
31 questions

Question 907

Report
Export
Collapse

Which of the following is the MOST secure password technique?

A.
Passphrase
A.
Passphrase
Answers
B.
One-time password
B.
One-time password
Answers
C.
Cognitive password
C.
Cognitive password
Answers
D.
dphertext
D.
dphertext
Answers
Suggested answer: A
asked 18/09/2024
ahmad hafiz
35 questions

Question 908

Report
Export
Collapse

Which of the following is a Key Performance Indicator (KPI) for a security training and awareness program?

A.
The number of security audits performed
A.
The number of security audits performed
Answers
B.
The number of attendees at security training events
B.
The number of attendees at security training events
Answers
C.
The number of security training materials created
C.
The number of security training materials created
Answers
D.
The number of security controls implemented
D.
The number of security controls implemented
Answers
Suggested answer: B
asked 18/09/2024
shylashri selvamani
46 questions

Question 909

Report
Export
Collapse

When are security requirements the LEAST expensive to implement?

A.
When identified by external consultants
A.
When identified by external consultants
Answers
B.
During the application rollout phase
B.
During the application rollout phase
Answers
C.
During each phase of the project cycle
C.
During each phase of the project cycle
Answers
D.
When built into application design
D.
When built into application design
Answers
Suggested answer: D
asked 18/09/2024
Alejandro Yepez
47 questions

Question 910

Report
Export
Collapse

What type of attack sends Internet Control Message Protocol (ICMP) echo requests to the target machine with a larger payload than the target can handle?

A.
Man-in-the-Middle (MITM)
A.
Man-in-the-Middle (MITM)
Answers
B.
Denial of Service (DoS)
B.
Denial of Service (DoS)
Answers
C.
Domain Name Server (DNS) poisoning
C.
Domain Name Server (DNS) poisoning
Answers
D.
Buffer overflow
D.
Buffer overflow
Answers
Suggested answer: B
asked 18/09/2024
Kinzonji Tavares
42 questions
Total 1.482 questions
Go to page: of 149