CISSP Practice Test Questions

1487 Questions


Topic 12: NEW QUESTIONS A

Which of the following restricts the ability of an individual to carry out all the steps of a particular process?


A.

Job rotation


B.

Separation of duties


C.

Least privilege


D.

Mandatory vacations





B.
  

Separation of duties



Which of the following command line tools can be used in the reconnaissance phase of a network vulnerability assessment?


A.

dig


B.

ipconfig


C.

ifconfig


D.

nbstat





A.
  

dig



Network-based logging has which advantage over host-based logging when reviewing malicious activity about a victim machine?


A.

Addresses and protocols of network-based logs are analyzed.


B.

Host-based system logging has files stored in multiple locations.


C.

Properly handled network-based logs may be more reliable and valid.


D.

Network-based systems cannot capture users logging into the console





A.
  

Addresses and protocols of network-based logs are analyzed.



Which of the following media sanitization techniques is MOST likely to be effective for an organization using public cloud services?


A.

Low-level formatting


B.

Secure-grade overwrite erasure


C.

Cryptographic erasure


D.

Drive degaussing





B.
  

Secure-grade overwrite erasure



In configuration management, what baseline configuration information MUST be
maintained for each computer system?


A.

Operating system and version, patch level, applications running, and versions.


B.

List of system changes, test reports, and change approvals


C.

Last vulnerability assessment report and initial risk assessment report


D.

Date of last update, test report, and accreditation certificate





A.
  

Operating system and version, patch level, applications running, and versions.



In general, servers that are facing the Internet should be placed in a demilitarized zone (DMZ). What is MAIN purpose of the DMZ?


A.

Reduced risk to internal systems.


B.

Prepare the server for potential attacks.


C.

Mitigate the risk associated with the exposed server.


D.

Bypass the need for a firewall





A.
  

Reduced risk to internal systems.



An employee of a retail company has been granted an extended leave of absence by Human Resources (HR). This information has been formally communicated to the access provisioning team. Which of the following is the BEST action to take?


A.

Revoke access temporarily.


B.

Block user access and delete user account after six months.


C.

Block access to the offices immediately.


D.

Monitor account usage temporarily.





D.
  

Monitor account usage temporarily.



Which of the following is needed to securely distribute symmetric cryptographic keys?


A.

Officially approved Public-Key Infrastructure (PKI) Class 3 or Class 4 certificates


B.

Officially approved and compliant key management technology and processes


C.

An organizationally approved communication protection policy and key management plan


D.

Hardware tokens that protect the user’s private key.





C.
  

An organizationally approved communication protection policy and key management plan



During which of the following processes is least privilege implemented for a user account?


A.

Provision


B.

Approve


C.

Request


D.

Review





A.
  

Provision



What is the MOST important element when considering the effectiveness of a training program for Business Continuity (BC) and Disaster Recovery (DR)?


A.

Management support


B.

Consideration of organizational need


C.

Technology used for delivery


D.

Target audience





B.
  

Consideration of organizational need



In which identity management process is the subject’s identity established?


A.

Trust


B.

Provisioning


C.

Authorization


D.

Enrollment





D.
  

Enrollment



Which of the following is the MOST important consideration when developing a Disaster Recovery Plan (DRP)?


A.

The dynamic reconfiguration of systems


B.

The cost of downtime


C.

A recovery strategy for all business processes


D.

A containment strategy





C.
  

A recovery strategy for all business processes




Page 38 out of 124 Pages
Previous