ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 97

Question list
Search

Question 961

Report
Export
Collapse

Which of the following actions should be taken by a security professional when a mission critical computer network attack is suspected?

Isolate the network, log an independent report, fix the problem, and redeploy the computer.
Isolate the network, log an independent report, fix the problem, and redeploy the computer.
Isolate the network, install patches, and report the occurrence.
Isolate the network, install patches, and report the occurrence.
Prioritize, report, and investigate the occurrence.
Prioritize, report, and investigate the occurrence.
Turn the rooter off, perform forensic analysis, apply the appropriate fin, and log incidents.
Turn the rooter off, perform forensic analysis, apply the appropriate fin, and log incidents.
Suggested answer: C
asked 18/09/2024
Maxime SELLY
43 questions

Question 962

Report
Export
Collapse

In what phase of the System Development Life Cycle (SDLC) should security training for the development team begin?

Development/Acquisition
Development/Acquisition
Initiation
Initiation
Implementation/ Assessment
Implementation/ Assessment
Disposal
Disposal
Suggested answer: A
asked 18/09/2024
lance bonczkiewicz
31 questions

Question 963

Report
Export
Collapse

Of the following, which BEST provides non- repudiation with regards to access to a server room?

Fob and Personal Identification Number (PIN)
Fob and Personal Identification Number (PIN)
Locked and secured cages
Locked and secured cages
Biometric readers
Biometric readers
Proximity readers
Proximity readers
Suggested answer: C
asked 18/09/2024
Rama Krishna
38 questions

Question 964

Report
Export
Collapse

The personal laptop of an organization executive is stolen from the office, complete with personnel and project records. Which of the following should be done FIRST to mitigate future occurrences?

Encrypt disks on personal laptops.
Encrypt disks on personal laptops.
Issue cable locks for use on personal laptops.
Issue cable locks for use on personal laptops.
Create policies addressing critical information on personal laptops.
Create policies addressing critical information on personal laptops.
Monitor personal laptops for critical information.
Monitor personal laptops for critical information.
Suggested answer: A
asked 18/09/2024
NSANG Cyril
34 questions

Question 965

Report
Export
Collapse

Which of the following is a standard Access Control List (ACL) element that enables a router to filter Internet traffic?

Media Access Control (MAC) address
Media Access Control (MAC) address
Internet Protocol (IP) address
Internet Protocol (IP) address
Security roles
Security roles
Device needs
Device needs
Suggested answer: B
asked 18/09/2024
Stan Nichols
32 questions

Question 966

Report
Export
Collapse

Which of the following will accomplish Multi-Factor Authentication (MFA)?

Issuing a smart card with a user-selected Personal Identification Number (PIN)
Issuing a smart card with a user-selected Personal Identification Number (PIN)
Requiring users to enter a Personal Identification Number (PIN) and a password
Requiring users to enter a Personal Identification Number (PIN) and a password
Performing a palm and retinal scan
Performing a palm and retinal scan
Issuing a smart card and a One Time Password (OTP) token
Issuing a smart card and a One Time Password (OTP) token
Suggested answer: A
asked 18/09/2024
Stephen DeWhite
37 questions

Question 967

Report
Export
Collapse

Which of the following is the PRIMARY issue when analyzing detailed log information?

Logs may be unavailable when required
Logs may be unavailable when required
Timely review of the data is potentially difficult
Timely review of the data is potentially difficult
Most systems and applications do not support logging
Most systems and applications do not support logging
Logs do not provide sufficient details of system and individual activities
Logs do not provide sufficient details of system and individual activities
Suggested answer: D
asked 18/09/2024
Rutger Pels
32 questions

Question 968

Report
Export
Collapse

How does security in a distributed file system using mutual authentication differ from file security in a multi-user host?

Access control can rely on the Operating System (OS), but eavesdropping is
Access control can rely on the Operating System (OS), but eavesdropping is
Access control cannot rely on the Operating System (OS), and eavesdropping
Access control cannot rely on the Operating System (OS), and eavesdropping
Access control can rely on the Operating System (OS), and eavesdropping is
Access control can rely on the Operating System (OS), and eavesdropping is
Access control cannot rely on the Operating System (OS), and eavesdropping
Access control cannot rely on the Operating System (OS), and eavesdropping
Suggested answer: C
asked 18/09/2024
Paulina Radziszewska
36 questions

Question 969

Report
Export
Collapse

Which of the following explains why classifying data is an important step in performing a Risk assessment?

To provide a framework for developing good security metrics
To provide a framework for developing good security metrics
To justify the selection of costly security controls
To justify the selection of costly security controls
To classify the security controls sensitivity that helps scope the risk assessment
To classify the security controls sensitivity that helps scope the risk assessment
To help determine the appropriate level of data security controls
To help determine the appropriate level of data security controls
Suggested answer: D
asked 18/09/2024
Evans Sajere
22 questions

Question 970

Report
Export
Collapse

How is Remote Authentication Dial-In User Service (RADIUS) authentication accomplished?

It uses clear text and firewall rules.
It uses clear text and firewall rules.
It relies on Virtual Private Networks (VPN).
It relies on Virtual Private Networks (VPN).
It uses clear text and shared secret keys.
It uses clear text and shared secret keys.
It relies on asymmetric encryption keys.
It relies on asymmetric encryption keys.
Suggested answer: C
asked 18/09/2024
jitendra makwana
36 questions
Total 1.482 questions
Go to page: of 149