Pass the ISC ISC 2 Credentials CISSP Questions and answers with CertsForce

Viewing page 2 out of 16 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which of the following represents the GREATEST risk to data confidentiality?

Options:

A.

Network redundancies are not implemented


B.

Security awareness training is not completed


C.

Backup tapes are generated unencrypted


D.

Users have administrative privileges


Expert Solution
Questions # 17:

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?

Options:

A.

Host VM monitor audit logs


B.

Guest OS access controls


C.

Host VM access controls


D.

Guest OS audit logs


Expert Solution
Questions # 18:

Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?

Options:

A.

Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken


B.

Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability


C.

Management teams will understand the testing objectives and reputational risk to the organization


D.

Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels


Expert Solution
Questions # 19:

Which of the following could cause a Denial of Service (DoS) against an authentication system?

Options:

A.

Encryption of audit logs


B.

No archiving of audit logs


C.

Hashing of audit logs


D.

Remote access audit logs


Expert Solution
Questions # 20:

In which of the following programs is it MOST important to include the collection of security process data?

Options:

A.

Quarterly access reviews


B.

Security continuous monitoring


C.

Business continuity testing


D.

Annual security training


Expert Solution
Questions # 21:

Which of the following is of GREATEST assistance to auditors when reviewing system configurations?

Options:

A.

Change management processes


B.

User administration procedures


C.

Operating System (OS) baselines


D.

System backup documentation


Expert Solution
Questions # 22:

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?

Options:

A.

Add a new rule to the application layer firewall


B.

Block access to the service


C.

Install an Intrusion Detection System (IDS)


D.

Patch the application source code


Expert Solution
Questions # 23:

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

Options:

A.

Packet filtering


B.

Port services filtering


C.

Content filtering


D.

Application access control


Expert Solution
Questions # 24:

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

Options:

A.

WEP uses a small range Initialization Vector (IV)


B.

WEP uses Message Digest 5 (MD5)


C.

WEP uses Diffie-Hellman


D.

WEP does not use any Initialization Vector (IV)


Expert Solution
Questions # 25:

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

Options:

A.

Transport layer


B.

Application layer


C.

Network layer


D.

Session layer


Expert Solution
Questions # 26:

What is the purpose of an Internet Protocol (IP) spoofing attack?

Options:

A.

To send excessive amounts of data to a process, making it unpredictable


B.

To intercept network traffic without authorization


C.

To disguise the destination address from a target’s IP filtering devices


D.

To convince a system that it is communicating with a known entity


Expert Solution
Questions # 27:

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

Options:

A.

Layer 2 Tunneling Protocol (L2TP)


B.

Link Control Protocol (LCP)


C.

Challenge Handshake Authentication Protocol (CHAP)


D.

Packet Transfer Protocol (PTP)


Expert Solution
Questions # 28:

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

Options:

A.

Link layer


B.

Physical layer


C.

Session layer


D.

Application layer


Expert Solution
Questions # 29:

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

Options:

A.

Implement packet filtering on the network firewalls


B.

Install Host Based Intrusion Detection Systems (HIDS)


C.

Require strong authentication for administrators


D.

Implement logical network segmentation at the switches


Expert Solution
Questions # 30:

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?

Options:

A.

Intrusion Prevention Systems (IPS)


B.

Intrusion Detection Systems (IDS)


C.

Stateful firewalls


D.

Network Behavior Analysis (NBA) tools


Expert Solution
Viewing page 2 out of 16 pages
Viewing questions 16-30 out of questions