CISSP Practice Test Questions

1487 Questions


Topic 7: . Security Operations

Which of the following is a PRIMARY advantage of using a third-party identity service?



A.

Consolidation of multiple providers


B.

Directory synchronization


C.

Web based logon


D.

Automated account management





B.
  

Directory synchronization



What is the MOST important step during forensic analysis when trying to learn the purpose
of an unknown application?


A.

Disable all unnecessary services


B.

Ensure chain of custody


C.

Prepare another backup of the system


D.

 Isolate the system from the network





D.
  

 Isolate the system from the network



What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?


A.

Warm site


B.

Hot site


C.

Mirror site


D.

Cold site





A.
  

Warm site



Which of the following types of business continuity tests includes assessment of resilience
to internal and external risks without endangering live operations?


A.

Walkthrough


B.

Simulation


C.

Parallel


D.

White box





C.
  

Parallel



Which of the following is the FIRST step in the incident response process?


A.

Determine the cause of the incident


B.

Disconnect the system involved from the network


C.

Isolate and contain the system involved


D.

Investigate all symptoms to confirm the incident





D.
  

Investigate all symptoms to confirm the incident



Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?


A.

Walkthrough


B.

Simulation


C.

Parallel


D.

White box





C.
  

Parallel



Which of the following is the BEST method to prevent malware from being introduced into a production environment?


A.

Purchase software from a limited list of retailers


B.

Verify the hash key or certificate key of all updates


C.

Do not permit programs, patches, or updates from the Internet


D.

Test all new software in a segregated environment





D.
  

Test all new software in a segregated environment



Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?


A.

Check arguments in function calls


B.

Test for the security patch level of the environment


C.

Include logging functions


D.

Digitally sign each application module





B.
  

Test for the security patch level of the environment



A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected. What is the MOST probable security feature of Java preventing the program from operating as intended?


A.

Least privilege


B.

Privilege escalation


C.

Defense in depth


D.

Privilege bracketing





A.
  

Least privilege



When in the Software Development Life Cycle (SDLC) MUST software security functional
requirements be defined?


A.

After the system preliminary design has been developed and the data security categorization has been performed


B.

After the vulnerability analysis has been performed and before the system detailed design begins


C.

After the system preliminary design has been developed and before the data security categorization begins


D.

After the business functional analysis and the data security categorization have been performed





D.
  

After the business functional analysis and the data security categorization have been performed



Which of the following is the PRIMARY risk with using open source software in a
commercial software construction?


A.

Lack of software documentation


B.

License agreements requiring release of modified code


C.

Expiration of the license agreement


D.

Costs associated with support of the software





D.
  

Costs associated with support of the software



The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)?


A.

System acquisition and development


B.

System operations and maintenance


C.

System initiation


D.

System implementation





A.
  

System acquisition and development




Page 5 out of 124 Pages
Previous