ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 91

Question list
Search
Search

Which of the following models uses unique groups contained in unique conflict classes?

A.
Chinese Wall
A.
Chinese Wall
Answers
B.
Bell-LaPadula
B.
Bell-LaPadula
Answers
C.
Clark-Wilson
C.
Clark-Wilson
Answers
D.
Biba
D.
Biba
Answers
Suggested answer: C

When developing the entitlement review process, which of the following roles is responsible for determining who has a need for the information?

A.
Data Custodian
A.
Data Custodian
Answers
B.
Data Owner
B.
Data Owner
Answers
C.
Database Administrator
C.
Database Administrator
Answers
D.
Information Technology (IT) Director
D.
Information Technology (IT) Director
Answers
Suggested answer: B

What should an auditor do when conducting a periodic audit on media retention?

A.
Check electronic storage media to ensure records are not retained past their destruction date.
A.
Check electronic storage media to ensure records are not retained past their destruction date.
Answers
B.
Ensure authorized personnel are in possession of paper copies containing Personally Identifiable Information....
B.
Ensure authorized personnel are in possession of paper copies containing Personally Identifiable Information....
Answers
C.
Check that hard disks containing backup data that are still within a retention cycle are being destroyed....
C.
Check that hard disks containing backup data that are still within a retention cycle are being destroyed....
Answers
D.
Ensure that data shared with outside organizations is no longer on a retention schedule.
D.
Ensure that data shared with outside organizations is no longer on a retention schedule.
Answers
Suggested answer: A

Which of the following factors is á PRIMARY reason to drive changes in an Information Security Continuous Monitoring (ISCM) strategy?

A.
Testing and Evaluation (TE) personnel changes
A.
Testing and Evaluation (TE) personnel changes
Answers
B.
Changes to core missions or business processes
B.
Changes to core missions or business processes
Answers
C.
Increased Cross-Site Request Forgery (CSRF) attacks
C.
Increased Cross-Site Request Forgery (CSRF) attacks
Answers
D.
Changes in Service Organization Control (SOC) 2 reporting requirements
D.
Changes in Service Organization Control (SOC) 2 reporting requirements
Answers
Suggested answer: B

Digital non-repudiation requires which of the following?

A.
A trusted third-party
A.
A trusted third-party
Answers
B.
Appropriate corporate policies
B.
Appropriate corporate policies
Answers
C.
Symmetric encryption
C.
Symmetric encryption
Answers
D.
Multifunction access cards
D.
Multifunction access cards
Answers
Suggested answer: A

Data remanence is the biggest threat in which of the following scenarios?

A.
A physical disk drive has been overwritten and reused within a datacenter.
A.
A physical disk drive has been overwritten and reused within a datacenter.
Answers
B.
A physical disk drive has been degaussed, verified, and released to a third party for dest....
B.
A physical disk drive has been degaussed, verified, and released to a third party for dest....
Answers
C.
A flash drive has been overwritten, verified, and reused within a datacenter.
C.
A flash drive has been overwritten, verified, and reused within a datacenter.
Answers
D.
A flash drive has been overwritten and released to a third party for destruction.
D.
A flash drive has been overwritten and released to a third party for destruction.
Answers
Suggested answer: D

Which of the following is the MOST secure password technique?

A.
Passphrase
A.
Passphrase
Answers
B.
One-time password
B.
One-time password
Answers
C.
Cognitive password
C.
Cognitive password
Answers
D.
dphertext
D.
dphertext
Answers
Suggested answer: A

Which of the following is a Key Performance Indicator (KPI) for a security training and awareness program?

A.
The number of security audits performed
A.
The number of security audits performed
Answers
B.
The number of attendees at security training events
B.
The number of attendees at security training events
Answers
C.
The number of security training materials created
C.
The number of security training materials created
Answers
D.
The number of security controls implemented
D.
The number of security controls implemented
Answers
Suggested answer: B

When are security requirements the LEAST expensive to implement?

A.
When identified by external consultants
A.
When identified by external consultants
Answers
B.
During the application rollout phase
B.
During the application rollout phase
Answers
C.
During each phase of the project cycle
C.
During each phase of the project cycle
Answers
D.
When built into application design
D.
When built into application design
Answers
Suggested answer: D

What type of attack sends Internet Control Message Protocol (ICMP) echo requests to the target machine with a larger payload than the target can handle?

A.
Man-in-the-Middle (MITM)
A.
Man-in-the-Middle (MITM)
Answers
B.
Denial of Service (DoS)
B.
Denial of Service (DoS)
Answers
C.
Domain Name Server (DNS) poisoning
C.
Domain Name Server (DNS) poisoning
Answers
D.
Buffer overflow
D.
Buffer overflow
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149