CISSP Practice Test Questions

1487 Questions


Topic 10: Exam Set B

Refer to the information below to answer the question.
A large organization uses unique identifiers and requires them at the start of every system
session. Application access is based on job classification. The organization is subject to
periodic independent reviews of access controls and violations. The organization uses
wired and wireless networks and remote access. The organization also uses secure
connections to branch offices and secure backup and recovery strategies for selected
information and processes.
In addition to authentication at the start of the user session, best practice would require reauthentication


A.

periodically during a session.


B.

for each business process.


C.

at system sign-off.


D.

after a period of inactivity.





D.
  

after a period of inactivity.



Which of the following is the MOST beneficial to review when performing an IT audit?


A.

Audit policy


B.

Security log


C.

Security policies


D.

Configuration settings





C.
  

Security policies



Refer to the information below to answer the question.
An organization has hired an information security officer to lead their security department.
The officer has adequate people resources but is lacking the other necessary components
to have an effective security program. There are numerous initiatives requiring security
involvement.
Given the number of priorities, which of the following will MOST likely influence the
selection of top initiatives?


A.

Severity of risk


B.

Complexity of strategy


C.

Frequency of incidents


D.

Ongoing awareness





A.
  

Severity of risk



Which of the following MOST influences the design of the organization's electronic
monitoring policies?


A.

Workplace privacy laws


B.

Level of organizational trust


C.

Results of background checks


D.

Business ethical considerations





A.
  

Workplace privacy laws



Which of the following is a BEST practice when traveling internationally with laptops containing Personally Identifiable Information (PII)?


A.

Use a thumb drive to transfer information from a foreign computer.


B.

Do not take unnecessary information, including sensitive information.


C.

Connect the laptop only to well-known networks like the hotel or public Internet cafes.


D.

Request international points of contact help scan the laptop on arrival to ensure it is protected.





B.
  

Do not take unnecessary information, including sensitive information.



Which of the following describes the concept of a Single Sign-On (SSO) system?


A.

Users are authenticated to one system at a time.


B.

Users are identified to multiple systems with several credentials.


C.

Users are authenticated to multiple systems with one login.


D.

Only one user is using the system at a time.





C.
  

Users are authenticated to multiple systems with one login.



Which of the following BEST mitigates a replay attack against a system using identity
federation and Security Assertion Markup Language (SAML) implementation?


A.

Two-factor authentication


B.

Digital certificates and hardware tokens


C.

Timed sessions and Secure Socket Layer (SSL)


D.

Passwords with alpha-numeric and special characters





C.
  

Timed sessions and Secure Socket Layer (SSL)



What is the MOST effective method for gaining unauthorized access to a file protected with
a long complex password?


A.

Brute force attack


B.

Frequency analysis


C.

Social engineering


D.

Dictionary attack





C.
  

Social engineering



During an audit, the auditor finds evidence of potentially illegal activity. Which of the
following is the MOST appropriate action to take?


A.

Immediately call the police


B.

Work with the client to resolve the issue internally


C.

Advise the person performing the illegal activity to cease and desist


D.

Work with the client to report the activity to the appropriate authority





D.
  

Work with the client to report the activity to the appropriate authority



Which of the following is required to determine classification and ownership?


A.

System and data resources are properly identified


B.

Access violations are logged and audited


C.

Data file references are identified and linked


D.

System security controls are fully integrated





A.
  

System and data resources are properly identified



From a security perspective, which of the following is a best practice to configure a Domain
Name Service (DNS) system?


A.

Configure secondary servers to use the primary server as a zone forwarder.


B.

Block all Transmission Control Protocol (TCP) connections.


C.

Disable all recursive queries on the name servers.


D.

Limit zone transfers to authorized devices.





D.
  

Limit zone transfers to authorized devices.



The amount of data that will be collected during an audit is PRIMARILY determined by the


A.

audit scope.


B.

auditor's experience level.


C.

availability of the datA.


D.

integrity of the datA.





A.
  

audit scope.




Page 25 out of 124 Pages
Previous