ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 84

List of questions

Question 831

Report
Export
Collapse

Which of the following would an internal technical security audit BEST validate?

Whether managerial controls are in place
Whether managerial controls are in place
Support for security programs by executive management
Support for security programs by executive management
Appropriate third-party system hardening
Appropriate third-party system hardening
Implementation of changes to a system
Implementation of changes to a system
Suggested answer: D
asked 18/09/2024
Dustin Sickle
31 questions

Question 832

Report
Export
Collapse

Which of the following processes has the PRIMARY purpose of identifying outdated software versions, missing patches, and lapsed system updates?

Penetration testing
Penetration testing
Vulnerability management
Vulnerability management
Software Development Life Cycle (SDLC)
Software Development Life Cycle (SDLC)
Life cycle management
Life cycle management
Suggested answer: B

Explanation:

Reference: https://resources.infosecinstitute.com/category/certificationstraining/cissp/domains/security-operations/vulnerability-and-patch-management/#gref

asked 18/09/2024
Anthony Steele
42 questions

Question 833

Report
Export
Collapse

A development operations team would like to start building new applications delegating the cybersecurity responsibility as much as possible to the service provider. Which of the following environments BEST fits their need?

Cloud Virtual Machines (VM)
Cloud Virtual Machines (VM)
Cloud application container within a Virtual Machine (VM)
Cloud application container within a Virtual Machine (VM)
On premises Virtual Machine (VM)
On premises Virtual Machine (VM)
Self-hosted Virtual Machine (VM)
Self-hosted Virtual Machine (VM)
Suggested answer: A
asked 18/09/2024
Nestor Quintero
40 questions

Question 834

Report
Export
Collapse

Change management policies and procedures belong to which of the following types of controls?

Directive
Directive
Detective
Detective
Corrective
Corrective
Preventative
Preventative
Suggested answer: A

Explanation:

Reference:

https://books.google.com.pk/books?id=9gCn86CmsNQC&pg=PA570&lpg=PA570&dq=CISSP+Change+management+policies+and+procedures+belong+to+which+type+of+control&source=bl&ots=riGvVpUO4H&sig=ACfU3U0kRWWaIIj7gwqlovVku880wG5LOg&hl=en&sa=X&ved=2ahUKEwjA7cGL_anpAhULxoUKHc1lD3UQ6AEwCnoECBIQAQ#v=onepage&q=CISSP%20Change%20management%20policies%20and%20procedures%20belong%20to%20which%20type%20of%20control&f=false

asked 18/09/2024
Casey Donovan
40 questions

Question 835

Report
Export
Collapse

What access control scheme uses fine-grained rules to specify the conditions under which access to each data item or applications is granted?

Mandatory Access Control (MAC)
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Discretionary Access Control (DAC)
Role Based Access Control (RBAC)
Role Based Access Control (RBAC)
Attribute Based Access Control (ABAC)
Attribute Based Access Control (ABAC)
Suggested answer: D

Explanation:

Reference: https://en.wikipedia.org/wiki/Attribute-based_access_control

asked 18/09/2024
luis gilberto correa betancur
44 questions

Question 836

Report
Export
Collapse

Why is planning the MOST critical phase of a Role Based Access Control (RBAC) implementation?

The criteria for measuring risk is defined.
The criteria for measuring risk is defined.
User populations to be assigned to each role is determined.
User populations to be assigned to each role is determined.
Role mining to define common access patterns is performed.
Role mining to define common access patterns is performed.
The foundational criteria are defined.
The foundational criteria are defined.
Suggested answer: B
asked 18/09/2024
Rocco Cristofaro
45 questions

Question 837

Report
Export
Collapse

Vulnerability scanners may allow for the administrator to assign which of the following in order to assist in prioritizing remediation activities?

Definitions for each exposure type
Definitions for each exposure type
Vulnerability attack vectors
Vulnerability attack vectors
Asset values for networks
Asset values for networks
Exploit code metrics
Exploit code metrics
Suggested answer: C
asked 18/09/2024
Darin Ambrose
40 questions

Question 838

Report
Export
Collapse

In order for application developers to detect potential vulnerabilities earlier during the Software Development Life Cycle (SDLC), which of the following safeguards should be implemented FIRST as part of a comprehensive testing framework?

Source code review
Source code review
Acceptance testing
Acceptance testing
Threat modeling
Threat modeling
Automated testing
Automated testing
Suggested answer: A
asked 18/09/2024
Sergy Camilo
36 questions

Question 839

Report
Export
Collapse

Physical assets defined in an organization's Business Impact Analysis (BIA) could include which of the following?

Personal belongings of organizational staff members
Personal belongings of organizational staff members
Supplies kept off-site at a remote facility
Supplies kept off-site at a remote facility
Cloud-based applications
Cloud-based applications
Disaster Recovery (DR) line-item revenues
Disaster Recovery (DR) line-item revenues
Suggested answer: B
asked 18/09/2024
CHEUNG KA FAI
41 questions

Question 840

Report
Export
Collapse

What is the best way for mutual authentication of devices belonging to the same organization?

Token
Token
Certificates
Certificates
User ID and passwords
User ID and passwords
Biometric
Biometric
Suggested answer: A

Explanation:

Reference:

https://books.google.com.pk/books?id=bb0re6h8JPAC&pg=PA637&lpg=PA637&dq=CISSP+for+mutual+authentication+of+devices+belonging+to+the+same+organization&source=bl&ots=7VyomeF8Fj&sig=ACfU3U3ZoosKA_v0zOaW67NSffzcCR7sA&hl=en&sa=X&ved=2ahUKEwjq4o2TgKrpAhUQ9IUKHbGlAhwQ6AEwAHoECBEQAQ#v=onepage&q=CISSP%20for%20mutual%20authentication%20of%20devices%20belonging%20to%20the%20same%20organization&f=false

asked 18/09/2024
Bianca Duizer
48 questions
Total 1.482 questions
Go to page: of 149