ExamGecko
Home Home / ISC / CISSP-ISSMP

ISC CISSP-ISSMP Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Which of the following security issues does the Bell-La Padula model focus on?

A.
Authentication
A.
Authentication
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Integrity
C.
Integrity
Answers
D.
Authorization
D.
Authorization
Answers
Suggested answer: B

Which of the following are the examples of administrative controls? Each correct answer represents a complete solution. Choose all that apply.

A.
Security awareness training
A.
Security awareness training
Answers
B.
Security policy
B.
Security policy
Answers
C.
Data Backup
C.
Data Backup
Answers
D.
Auditing
D.
Auditing
Answers
Suggested answer: A, B

Which of the following are the types of access controls? Each correct answer represents a complete solution. Choose three.

A.
Administrative
A.
Administrative
Answers
B.
Automatic
B.
Automatic
Answers
C.
Physical
C.
Physical
Answers
D.
Technical
D.
Technical
Answers
Suggested answer: A, C, D

Which of the following laws enacted in United States makes it illegal for an Internet Service Provider (ISP) to allow child pornography to exist on Web sites?

A.
Child Pornography Prevention Act (CPPA)
A.
Child Pornography Prevention Act (CPPA)
Answers
B.
USA PATRIOT Act
B.
USA PATRIOT Act
Answers
C.
Prosecutorial Remedies and Tools Against the Exploitation of Children Today Act (PROTECT Act)
C.
Prosecutorial Remedies and Tools Against the Exploitation of Children Today Act (PROTECT Act)
Answers
D.
Sexual Predators Act
D.
Sexual Predators Act
Answers
Suggested answer: D

Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?

A.
Legal representative
A.
Legal representative
Answers
B.
Technical representative
B.
Technical representative
Answers
C.
Lead investigator
C.
Lead investigator
Answers
D.
Information security representative
D.
Information security representative
Answers
Suggested answer: B

A Web-based credit card company had collected financial and personal details of Mark before issuing him a credit card. The company has now provided Mark's financial and personal details to another company. Which of the following Internet laws has the credit card issuing company violated?

A.
Copyright law
A.
Copyright law
Answers
B.
Trademark law
B.
Trademark law
Answers
C.
Privacy law
C.
Privacy law
Answers
D.
Security law
D.
Security law
Answers
Suggested answer: C

You work as a Web Administrator for Perfect World Inc. The company is planning to host an E-commerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it? Each correct answer represents a part of the solution. Choose two.

A.
Use encrypted authentication.
A.
Use encrypted authentication.
Answers
B.
Use the SSL protocol.
B.
Use the SSL protocol.
Answers
C.
Use the EAP protocol.
C.
Use the EAP protocol.
Answers
D.
Use Basic authentication.
D.
Use Basic authentication.
Answers
Suggested answer: A, B

Which of the following statements are true about security risks? Each correct answer represents a complete solution. Choose three.

A.
They can be analyzed and measured by the risk analysis process.
A.
They can be analyzed and measured by the risk analysis process.
Answers
B.
They can be removed completely by taking proper actions.
B.
They can be removed completely by taking proper actions.
Answers
C.
They can be mitigated by reviewing and taking responsible actions based on possible risks.
C.
They can be mitigated by reviewing and taking responsible actions based on possible risks.
Answers
D.
They are considered an indicator of threats coupled with vulnerability.
D.
They are considered an indicator of threats coupled with vulnerability.
Answers
Suggested answer: A, C, D

Which of the following methods for identifying appropriate BIA interviewees' includes examining the organizational chart of the enterprise to understand the functional positions?

A.
Organizational chart reviews
A.
Organizational chart reviews
Answers
B.
Executive management interviews
B.
Executive management interviews
Answers
C.
Overlaying system technology
C.
Overlaying system technology
Answers
D.
Organizational process models
D.
Organizational process models
Answers
Suggested answer: A

Which of the following BCP teams provides clerical support to the other teams and serves as a message center for the user-recovery site?

A.
Security team
A.
Security team
Answers
B.
Data preparation and records team
B.
Data preparation and records team
Answers
C.
Administrative support team
C.
Administrative support team
Answers
D.
Emergency operations team
D.
Emergency operations team
Answers
Suggested answer: C
Total 218 questions
Go to page: of 22