CISSP Practice Test Questions

1487 Questions


Topic 14: NEW Questions C

What is the BEST approach for maintaining ethics when a security professional is
unfamiliar with the culture of a country and is asked to perform a questionable task?


A.

Exercise due diligence when deciding to circumvent host government requests.


B.

Become familiar with the means in which the code of ethics is applied and considered.


C.

Complete the assignment based on the customer's wishes.


D.

Execute according to the professional's comfort level with the code of ethics.





B.
  

Become familiar with the means in which the code of ethics is applied and considered.



Which of the following is strategy of grouping requirements in developing a security Test and Evaluation (ST&E)?


A.

Standards, policies, and procedures


B.

Documentation, observation, and manual


C.

Tactical, strategic, and financial


D.

Management, operational, and technical





D.
  

Management, operational, and technical



In order for application developers to detect potential vulnerabilities earlier during the
Software Development Life Cycle (SDLC), which of the following safeguards should be
implemented FIRST as part of a comprehensive testing framework?


A.

Source code review


B.

Acceptance testing


C.

Threat modeling


D.

Automated testing





A.
  

Source code review



Which of the following is the BEST reason to apply patches manually instead of automated
patch management?


A.

The cost required to install patches will be reduced.


B.

The time during which systems will remain vulnerable to an exploit will be decreased.


C.

The target systems reside within isolated networks.


D.

The ability to cover large geographic areas is increased.





C.
  

The target systems reside within isolated networks.



If a content management system (CSM) is implemented, which one of the following would
occur?


A.

The test and production systems would be riming the same software


B.

The applications placed into production would be secure


C.

Developers would no longer have access to production systems


D.

Patching the systems would be completed mere quickly





A.
  

The test and production systems would be riming the same software



When conducting a security assessment of access controls , Which activity is port of the
data analysis phase?


A.

Collect logs and reports.


B.

Present solutions to address audit exceptions.


C.

Categorize and Identify evidence gathered during the audit


D.

Conduct statiscal sampling of data transactions.





C.
  

Categorize and Identify evidence gathered during the audit



Which of the following in the BEST way to reduce the impact of an externally sourced flood attack?


A.

Stock the source address at the firewall.


B.

Have this service provide block the source address.


C.

Block all inbound traffic until the flood ends.


D.

Have the source service provider block the address





A.
  

Stock the source address at the firewall.



Which of the following practices provides the development of security and identification of
threats in designing software?


A.

Stakeholder review


B.

Requirements review


C.

Penetration testing


D.

Threat modeling





D.
  

Threat modeling



Which of the following will have the MOST influence on the definition and creation of data classification and data ownership policies?


A.

Data access control policies


B.

Threat modeling


C.

Common Criteria (CC)


D.

Business Impact Analysis (BIA)





A.
  

Data access control policies



What form of attack could this represent?


A.

A Denial of Service (DoS) attack against the gateway router because the router can no longer accept packets from


B.

A transport layer attack that prevents the resolution of 10.102.10.6 address


C.

A Denial of Service (DoS) attack against 10.102.10.2 because it cannot respond correctly to ARP requests


D.

A masquerading attack that sends packets intended for 10.102.10.6 to 10.102.10.2





D.
  

A masquerading attack that sends packets intended for 10.102.10.6 to 10.102.10.2



A criminal organization is planning an attack on a government network. Which of the following is the MOST severe attack to the network availability?


A.

Network management communications is disrupted by attacker


B.

Operator loses control of network devices to attacker


C.

Sensitive information is gathered on the network topology by attacker


D.

Network is flooded with communication traffic by attacker





B.
  

Operator loses control of network devices to attacker



In Identity Management (IdM), when is the verification stage performed?


A.

As part of system sign-on


B.

Before creation of the identity


C.

After revocation of the identity


D.

During authorization of the identity





A.
  

As part of system sign-on




Page 60 out of 124 Pages
Previous