ISC CISSP Exam Practice Questions (P. 5)
- Full Access (484 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
Which of the following is the BEST option to reduce the network attack surface of a system?
- ADisabling unnecessary ports and servicesMost Voted
- BEnsuring that there are no group accounts on the system
- CUninstalling default software on the system
- DRemoving unnecessary system user accounts
Correct Answer:
A
A
send
light_mode
delete
Question #42
The security architect is designing and implementing an internal certification authority to generate digital certificates for all employees. Which of the following is the
BEST solution to securely store the private keys?
BEST solution to securely store the private keys?
- APhysically secured storage device
- BTrusted Platform Module (TPM)Most Voted
- CEncrypted flash drive
- DPublic key infrastructure (PKI)
Correct Answer:
B
B
send
light_mode
delete
Question #43
The existence of physical barriers, card and personal identification number (PIN) access systems, cameras, alarms, and security guards BEST describes this security approach?
- AAccess control
- BSecurity information and event management (SIEM)
- CDefense-in-depthMost Voted
- DSecurity perimeter
Correct Answer:
D
D
send
light_mode
delete
Question #44
A hospital enforces the Code of Fair Information Practices. What practice applies to a patient requesting their medical records from a web portal?
- APurpose specification
- BCollection limitation
- CUse limitation
- DIndividual participationMost Voted
Correct Answer:
A
A
send
light_mode
delete
Question #45
A colleague who recently left the organization asked a security professional for a copy of the organization's confidential incident management policy. Which of the following is the BEST response to this request?
- AAccess the policy on a company-issued device and let the former colleague view the screen.
- BE-mail the policy to the colleague as they were already part of the organization and familiar with it.
- CDo not acknowledge receiving the request from the former colleague and ignore them.
- DSubmit the request using company official channels to ensure the policy is okay to distribute.Most Voted
Correct Answer:
C
C
send
light_mode
delete
Question #46
Which of the following BEST describes when an organization should conduct a black box security audit on a new software protect?
- AWhen the organization wishes to check for non-functional compliance
- BWhen the organization wants to enumerate known security vulnerabilities across their infrastructure
- CWhen the organization is confident the final source code is completeMost Voted
- DWhen the organization has experienced a security incident
Correct Answer:
C
C
send
light_mode
delete
Question #47
In software development, which of the following entities normally signs the code to protect the code integrity?
- AThe organization developing the codeMost Voted
- BThe quality control group
- CThe developer
- DThe data owner
Correct Answer:
A
A
send
light_mode
delete
Question #48
Which of the following technologies can be used to monitor and dynamically respond to potential threats on web applications?
- AField-level tokenization
- BWeb application vulnerability scanners
- CRuntime application self-protection (RASP)Most Voted
- DSecurity Assertion Markup Language (SAML)
Correct Answer:
B
B
send
light_mode
delete
Question #49
A security architect is developing an information system for a client. One of the requirements is to deliver a platform that mitigates against common vulnerabilities and attacks. What is the MOST efficient option used to prevent buffer overflow attacks?
- AAccess control mechanisms
- BProcess isolation
- CAddress Space Layout Randomization (ASLR)Most Voted
- DProcessor states
Correct Answer:
C
C
send
light_mode
delete
Question #50
In a quarterly system access review, an active privileged account was discovered that did not exist in the prior review on the production system. The account was created one hour after the previous access review. Which of the following is the BEST option to reduce overall risk in addition to quarterly access reviews?
- AImplement bi-annual reviews.
- BCreate policies for system access.
- CImplement and review risk-based alerts.Most Voted
- DIncrease logging levels.
Correct Answer:
B
B
send
light_mode
delete
All Pages