ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 96

Question list
Search
Search

How should the retention period for an organization's social media content be defined?

A.
By the retention policies of each social media service
A.
By the retention policies of each social media service
Answers
B.
By the records retention policy of the organization
B.
By the records retention policy of the organization
Answers
C.
By the Chief Information Officer (CIO)
C.
By the Chief Information Officer (CIO)
Answers
D.
By the amount of available storage space
D.
By the amount of available storage space
Answers
Suggested answer: B

In Identity Management (IdM), when is the verification stage performed?

A.
As part of system sign-on
A.
As part of system sign-on
Answers
B.
Before creation of the identity
B.
Before creation of the identity
Answers
C.
After revocation of the identity
C.
After revocation of the identity
Answers
D.
During authorization of the identity
D.
During authorization of the identity
Answers
Suggested answer: A

What is the PRIMARY purpose of auditing, as it relates to the security review cycle?

A.
To ensure the organization's controls and pokies are working as intended
A.
To ensure the organization's controls and pokies are working as intended
Answers
B.
To ensure the organization can still be publicly traded
B.
To ensure the organization can still be publicly traded
Answers
C.
To ensure the organization's executive team won't be sued
C.
To ensure the organization's executive team won't be sued
Answers
D.
To ensure the organization meets contractual requirements
D.
To ensure the organization meets contractual requirements
Answers
Suggested answer: A

Which of the following access control models is MOST restrictive?

A.
Discretionary Access Control (DAC)
A.
Discretionary Access Control (DAC)
Answers
B.
Mandatory Access Control (MAC)
B.
Mandatory Access Control (MAC)
Answers
C.
Role Based Access Control (RBAC)
C.
Role Based Access Control (RBAC)
Answers
D.
Rule based access control
D.
Rule based access control
Answers
Suggested answer: B

Which of the following is a canon of the (ISC)2 Code of Ethics?

A.
Integrity first, association before serf, and excellence in all we do
A.
Integrity first, association before serf, and excellence in all we do
Answers
B.
Perform all professional activities and duties in accordance with all applicable laws and the highest ethical standards.
B.
Perform all professional activities and duties in accordance with all applicable laws and the highest ethical standards.
Answers
C.
Provide diligent and competent service to principals.
C.
Provide diligent and competent service to principals.
Answers
D.
Cooperate with others in the interchange of knowledge and ideas for mutual security.
D.
Cooperate with others in the interchange of knowledge and ideas for mutual security.
Answers
Suggested answer: C

Which of the following will an organization's network vulnerability testing process BEST enhance?

A.
Firewall log review processes
A.
Firewall log review processes
Answers
B.
Asset management procedures
B.
Asset management procedures
Answers
C.
Server hardening processes
C.
Server hardening processes
Answers
D.
Code review procedures
D.
Code review procedures
Answers
Suggested answer: C

Which of the following is the MOST effective countermeasure against data remanence?

A.
Destruction
A.
Destruction
Answers
B.
Clearing
B.
Clearing
Answers
C.
Purging
C.
Purging
Answers
D.
Encryption
D.
Encryption
Answers
Suggested answer: A

A security professional has been requested by the Board of Directors and Chief Information Security Officer (CISO) to perform an internal and external penetration test. What is the BEST course of action?

A.
Review data localization requirements and regulations.
A.
Review data localization requirements and regulations.
Answers
B.
Review corporate security policies and procedures,
B.
Review corporate security policies and procedures,
Answers
C.
With notice to the Configuring a Wireless Access Point (WAP) with the same Service Set Identifier external test.
C.
With notice to the Configuring a Wireless Access Point (WAP) with the same Service Set Identifier external test.
Answers
D.
With notice to the organization, perform an external penetration test first, then an internal test.
D.
With notice to the organization, perform an external penetration test first, then an internal test.
Answers
Suggested answer: D

The Rivest-Shamir-Adleman (RSA) algorithm is BEST suited for which of the following operations?

A.
Bulk data encryption and decryption
A.
Bulk data encryption and decryption
Answers
B.
One-way secure hashing for user and message authentication
B.
One-way secure hashing for user and message authentication
Answers
C.
Secure key exchange for symmetric cryptography
C.
Secure key exchange for symmetric cryptography
Answers
D.
Creating digital checksums for message integrity
D.
Creating digital checksums for message integrity
Answers
Suggested answer: C

Configuring a Wireless Access Point (WAP) with the same Service Set Identifier (SSID) as another WAP in order to have users unknowingly connect is referred to as which of the following?

A.
Jamming
A.
Jamming
Answers
B.
Man-irHht-Middk (MITM)
B.
Man-irHht-Middk (MITM)
Answers
C.
War driving
C.
War driving
Answers
D.
Internet Protocol (IP) spoofing
D.
Internet Protocol (IP) spoofing
Answers
Suggested answer: B
Total 1.482 questions
Go to page: of 149