ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Question 91

Report
Export
Collapse

Which of the following tools works by using standard set of MS-DOS commands and can create an MD5 hash of an entire drive, partition, or selected files?

A.
Device Seizure
A.
Device Seizure
Answers
B.
Ontrack
B.
Ontrack
Answers
C.
DriveSpy
C.
DriveSpy
Answers
D.
Forensic Sorter
D.
Forensic Sorter
Answers
Suggested answer: C
asked 18/09/2024
Solomon Nidish
33 questions

Question 92

Report
Export
Collapse

Which of the following needs to be documented to preserve evidences for presentation in court?

A.
Separation of duties
A.
Separation of duties
Answers
B.
Account lockout policy
B.
Account lockout policy
Answers
C.
Incident response policy
C.
Incident response policy
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: D
asked 18/09/2024
Adam Vce
38 questions

Question 93

Report
Export
Collapse

Which of the following statements best explains how encryption works on the Internet?

A.
Encryption encodes information using specific algorithms with a string of numbers known as a key.
A.
Encryption encodes information using specific algorithms with a string of numbers known as a key.
Answers
B.
Encryption validates a username and password before sending information to the Web server.
B.
Encryption validates a username and password before sending information to the Web server.
Answers
C.
Encryption allows authorized users to access Web sites that offer online shopping.
C.
Encryption allows authorized users to access Web sites that offer online shopping.
Answers
D.
Encryption helps in transaction processing by e-commerce servers on the Internet.
D.
Encryption helps in transaction processing by e-commerce servers on the Internet.
Answers
Suggested answer: A
asked 18/09/2024
Jovin Jose
32 questions

Question 94

Report
Export
Collapse

Which of the following statutes is enacted in the U.S., which prohibits creditors from collecting data from applicants, such as national origin, caste, religion etc?

A.
The Fair Credit Reporting Act (FCRA)
A.
The Fair Credit Reporting Act (FCRA)
Answers
B.
The Privacy Act
B.
The Privacy Act
Answers
C.
The Electronic Communications Privacy Act
C.
The Electronic Communications Privacy Act
Answers
D.
The Equal Credit Opportunity Act (ECOA)
D.
The Equal Credit Opportunity Act (ECOA)
Answers
Suggested answer: D
asked 18/09/2024
Fahrurrazi .
25 questions

Question 95

Report
Export
Collapse

Which of the following security models deal only with integrity? Each correct answer represents a complete solution. Choose two.

A.
Biba-Wilson
A.
Biba-Wilson
Answers
B.
Clark-Wilson
B.
Clark-Wilson
Answers
C.
Bell-LaPadula
C.
Bell-LaPadula
Answers
D.
Biba
D.
Biba
Answers
Suggested answer: B, D
asked 18/09/2024
Jeff Fazio
43 questions

Question 96

Report
Export
Collapse

Rick is the project manager for TTM project. He is in the process of procuring services from vendors. He makes a contract with a vendor in which he precisely specify the services to be procured, and any changes to the procurement specification will increase the costs to the buyer. Which type of contract is this?

A.
Firm Fixed Price
A.
Firm Fixed Price
Answers
B.
Fixed Price Incentive Fee
B.
Fixed Price Incentive Fee
Answers
C.
Cost Plus Fixed Fee Contract
C.
Cost Plus Fixed Fee Contract
Answers
D.
Fixed Price with Economic Price Adjustment
D.
Fixed Price with Economic Price Adjustment
Answers
Suggested answer: A
asked 18/09/2024
Andy Mahoney
28 questions

Question 97

Report
Export
Collapse

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

A.
Preparation
A.
Preparation
Answers
B.
Eradication
B.
Eradication
Answers
C.
Identification
C.
Identification
Answers
D.
Containment
D.
Containment
Answers
Suggested answer: A
asked 18/09/2024
EDDIE LIN
43 questions

Question 98

Report
Export
Collapse

Which of the following security models focuses on data confidentiality and controlled access to classified information?

A.
Bell-La Padula model
A.
Bell-La Padula model
Answers
B.
Take-Grant model
B.
Take-Grant model
Answers
C.
Clark-Wilson model
C.
Clark-Wilson model
Answers
D.
Biba model
D.
Biba model
Answers
Suggested answer: A
asked 18/09/2024
ozgur yilmaz
30 questions

Question 99

Report
Export
Collapse

SIMULATION

Fill in the blank with the appropriate phrase. ____________ is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.

A.
Configuration status accounting
A.
Configuration status accounting
Answers
Suggested answer: A
asked 18/09/2024
Elizaveta Kutuzova
54 questions

Question 100

Report
Export
Collapse

SIMULATION

Fill in the blank with an appropriate phrase.___________ is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. Correct

A.
Patch management
A.
Patch management
Answers
Suggested answer: A
asked 18/09/2024
Johan Benavides
42 questions
Total 218 questions
Go to page: of 22