ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 93

Question list
Search

Question 921

Report
Export
Collapse

Which of the following BEST describes the objectives of the Business Impact Analysis (BIA)?

Identifying the events and environmental factors that can adversely affect an organization
Identifying the events and environmental factors that can adversely affect an organization
Identifying what is important and critical based on disruptions that can affect the organization.
Identifying what is important and critical based on disruptions that can affect the organization.
Establishing the need for a Business Continuity Plan (BCP) based on threats that can affect an organization
Establishing the need for a Business Continuity Plan (BCP) based on threats that can affect an organization
Preparing a program to create an organizational awareness for executing the Business Continuity Plan (BCP)
Preparing a program to create an organizational awareness for executing the Business Continuity Plan (BCP)
Suggested answer: B
asked 18/09/2024
Cyrom Meryll Santos
36 questions

Question 922

Report
Export
Collapse

The application owner of a system that handles confidential data leaves an organization. It is anticipated that a replacement will be hired in approximately six months. During that time, which of the following should the organization do?

Gram temporary access to the former application owner's account
Gram temporary access to the former application owner's account
Assign a temporary application owner to the system.
Assign a temporary application owner to the system.
Restrict access to the system until a replacement application owner rs hired.
Restrict access to the system until a replacement application owner rs hired.
Prevent changes to the confidential data until a replacement application owner is hired.
Prevent changes to the confidential data until a replacement application owner is hired.
Suggested answer: B
asked 18/09/2024
Ivan Dujmic
52 questions

Question 923

Report
Export
Collapse

Which Redundant Array c/ Independent Disks (RAID) Level does the following diagram represent?

ISC CISSP image Question 439 46788 09182024210517000000

RAID 0
RAID 0
RAID 1
RAID 1
RAID 5
RAID 5
RAID 10
RAID 10
Suggested answer: D
asked 18/09/2024
Daniel williams
51 questions

Question 924

Report
Export
Collapse

Which of the following is used to ensure that data mining activities Will NOT reveal sensitive data?

Implement two-factor authentication on the underlying infrastructure.
Implement two-factor authentication on the underlying infrastructure.
Encrypt data at the field level and tightly control encryption keys.
Encrypt data at the field level and tightly control encryption keys.
Preprocess the databases to see if inn ...... can be disclosed from the learned patterns.
Preprocess the databases to see if inn ...... can be disclosed from the learned patterns.
Implement the principle of least privilege on data elements so a reduced number of users can access the database.
Implement the principle of least privilege on data elements so a reduced number of users can access the database.
Suggested answer: D
asked 18/09/2024
Carlos Cabezas
49 questions

Question 925

Report
Export
Collapse

Why are packet filtering routers used in low-risk environments?

They are high-resolution source discrimination and identification tools.
They are high-resolution source discrimination and identification tools.
They are fast and flexible, and protect against Internet Protocol (IP) spoofing.
They are fast and flexible, and protect against Internet Protocol (IP) spoofing.
They are fast, flexible, and transparent.
They are fast, flexible, and transparent.
They enforce strong user authentication and audit tog generation.
They enforce strong user authentication and audit tog generation.
Suggested answer: B
asked 18/09/2024
cristian vargas
42 questions

Question 926

Report
Export
Collapse

Which of the following protocols will allow the encrypted transfer of content on the Internet?

Server Message Block (SMB)
Server Message Block (SMB)
Secure copy
Secure copy
Hypertext Transfer Protocol (HTTP)
Hypertext Transfer Protocol (HTTP)
Remote copy
Remote copy
Suggested answer: B
asked 18/09/2024
Solanki Narendra
34 questions

Question 927

Report
Export
Collapse

What requirement MUST be met during internal security audits to ensure that all information provided is expressed as an objective assessment without risk of retaliation?

The auditor must be independent and report directly to the management.
The auditor must be independent and report directly to the management.
The auditor must utilize automated tools to back their findings.
The auditor must utilize automated tools to back their findings.
The auditor must work closely with both the information Technology (IT) and security sections of an organization.
The auditor must work closely with both the information Technology (IT) and security sections of an organization.
The auditor must perform manual reviews of systems and processes.
The auditor must perform manual reviews of systems and processes.
Suggested answer: A
asked 18/09/2024
Romsat Sertec
36 questions

Question 928

Report
Export
Collapse

In order to support the least privilege security principle when a resource is transferring within the organization from a production support system administration role to a developer role, what changes should be made to the resource's access to the production operating system (OS) directory structure?

From Read Only privileges to No Access Privileges
From Read Only privileges to No Access Privileges
From Author privileges to Administrator privileges
From Author privileges to Administrator privileges
From Administrator privileges to No Access privileges
From Administrator privileges to No Access privileges
From No Access Privileges to Author privileges
From No Access Privileges to Author privileges
Suggested answer: C
asked 18/09/2024
David Aquino
41 questions

Question 929

Report
Export
Collapse

What is the FINAL step in the waterfall method for contingency planning?

Maintenance
Maintenance
Testing
Testing
Implementation
Implementation
Training
Training
Suggested answer: A
asked 18/09/2024
Updesh Kumar
37 questions

Question 930

Report
Export
Collapse

Which of the following is a security weakness in the evaluation of common criteria (CC) products?

The manufacturer can state what configuration of the product is to be evaluated.
The manufacturer can state what configuration of the product is to be evaluated.
The product can be evaluated by labs m other countries.
The product can be evaluated by labs m other countries.
The Target of Evaluation's (TOE) testing environment is identical to the operating environment
The Target of Evaluation's (TOE) testing environment is identical to the operating environment
The evaluations are expensive and time-consuming to perform.
The evaluations are expensive and time-consuming to perform.
Suggested answer: A
asked 18/09/2024
Reatlehile Motaung
25 questions
Total 1.482 questions
Go to page: of 149