ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

A.
Device Seizure
A.
Device Seizure
Answers
B.
Ontrack
B.
Ontrack
Answers
C.
DriveSpy
C.
DriveSpy
Answers
D.
Forensic Sorter
D.
Forensic Sorter
Answers
Suggested answer: C

Which of the following needs to be documented to preserve evidences for presentation in court?

A.
Separation of duties
A.
Separation of duties
Answers
B.
Account lockout policy
B.
Account lockout policy
Answers
C.
Incident response policy
C.
Incident response policy
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: D

Which of the following statements best explains how encryption works on the Internet?

A.
Encryption encodes information using specific algorithms with a string of numbers known as a key.
A.
Encryption encodes information using specific algorithms with a string of numbers known as a key.
Answers
B.
Encryption validates a username and password before sending information to the Web server.
B.
Encryption validates a username and password before sending information to the Web server.
Answers
C.
Encryption allows authorized users to access Web sites that offer online shopping.
C.
Encryption allows authorized users to access Web sites that offer online shopping.
Answers
D.
Encryption helps in transaction processing by e-commerce servers on the Internet.
D.
Encryption helps in transaction processing by e-commerce servers on the Internet.
Answers
Suggested answer: A

Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?

A.
The Fair Credit Reporting Act (FCRA)
A.
The Fair Credit Reporting Act (FCRA)
Answers
B.
The Privacy Act
B.
The Privacy Act
Answers
C.
The Electronic Communications Privacy Act
C.
The Electronic Communications Privacy Act
Answers
D.
The Equal Credit Opportunity Act (ECOA)
D.
The Equal Credit Opportunity Act (ECOA)
Answers
Suggested answer: D

Which of the following security models deal only with integrity? Each correct answer represents a complete solution. Choose two.

A.
Biba-Wilson
A.
Biba-Wilson
Answers
B.
Clark-Wilson
B.
Clark-Wilson
Answers
C.
Bell-LaPadula
C.
Bell-LaPadula
Answers
D.
Biba
D.
Biba
Answers
Suggested answer: B, D

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

A.
Firm Fixed Price
A.
Firm Fixed Price
Answers
B.
Fixed Price Incentive Fee
B.
Fixed Price Incentive Fee
Answers
C.
Cost Plus Fixed Fee Contract
C.
Cost Plus Fixed Fee Contract
Answers
D.
Fixed Price with Economic Price Adjustment
D.
Fixed Price with Economic Price Adjustment
Answers
Suggested answer: A

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

A.
Preparation
A.
Preparation
Answers
B.
Eradication
B.
Eradication
Answers
C.
Identification
C.
Identification
Answers
D.
Containment
D.
Containment
Answers
Suggested answer: A

Which of the following security models focuses on data confidentiality and controlled access to classified information?

A.
Bell-La Padula model
A.
Bell-La Padula model
Answers
B.
Take-Grant model
B.
Take-Grant model
Answers
C.
Clark-Wilson model
C.
Clark-Wilson model
Answers
D.
Biba model
D.
Biba model
Answers
Suggested answer: A

SIMULATION

Fill in the blank with the appropriate phrase. ____________ is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.

A.
Configuration status accounting
A.
Configuration status accounting
Answers
Suggested answer: A

SIMULATION

Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. Correct

A.
Patch management
A.
Patch management
Answers
Suggested answer: A
Total 218 questions
Go to page: of 22