Free Certification Practice Questions

ISC-CISSP

Loading…
Which of the following acts is a specialized privacy bill that affects any educational institution to accept any form of funding from the federal government?
#151
Which of the following statements about the integrity concept of information security management are true? Each correct answer represents a complete solution. Choose three.
#152
Which of the following contract types is described in the statement below? "This contract type provides no incentive for the contractor to control costs and hence is rarely utilized."
#153
Ned is the program manager for his organization and he's considering some new materials for his program. He and his team have never worked with these materials before and he wants to ask the vendor for some additional information, a demon, and even some samples. What type of a document should Ned send to the vendor?
#154
What is a stakeholder analysis chart?
#155
Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?
#156
Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?
#157
In which of the following SDLC phases is the system's security features configured and enabled, the system is tested and installed or fielded, and the system is authorized for processing?
#158
Which of the following laws or acts, formed in Australia, enforces prohibition against cyber stalking?
#159
Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?
#160
Which of the following roles is responsible for ensuring that important datasets are developed, maintained, and are accessible within their defined specifications?
#161
What is static analysis intended to do when analyzing an executable file?
#162
A network security engineer needs to ensure that a security solution analyzes traffic for protocol manipulation and various sorts of common attacks. In addition, all Uniform Resource Locator (URL) traffic must be inspected and users prevented from browsing inappropriate websites. Which of the following solutions should be implemented to enable administrators the capability to analyze traffic, blacklist external sites, and log user traffic for later analysis?
#163
What is the PRIMARY consideration when testing industrial control systems (ICS) for security weaknesses?
#164
The security team plans on using automated account reconciliation in the corporate user access review process. Which of the following must be implemented for the BEST results with fewest errors when running the audit?
#165
A cloud service accepts Security Assertion Markup Language (SAML) assertions from users to exchange authentication and authorization data between security domains. However, an attacker was able to spoof a registered account on the network and query the SAML provider. What is the MOST common attack leveraged against this flaw?
#166
An organization is implementing security review as part of system development. Which of the following is the BEST technique to follow?
#167
What Hypertext Transfer Protocol (HTTP) response header can be used to disable the execution of inline JavaScript and the execution of eval()-type functions?
#168
A security professional was tasked with rebuilding a company's wireless infrastructure. Which of the following are the MOST important factors to consider while making a decision on which wireless spectrum to deploy?
#169
A software development company has a short timeline in which to deliver a software product. The software development team decides to use open-source software libraries to reduce the development time. What concept should software developers consider when using open-source software libraries?
#170
Which element of software supply chain management has the GREATEST security risk to organizations?
#171
When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess?
#172
Which of the following should be done at a disaster site before any item is removed, repaired, or replaced?
#173
When designing a new Voice over Internet Protocol (VoIP) network, an organization's top concern is preventing unauthorized users accessing the VoIP network. Which of the following will BEST help secure the VoIP network?
#174
A user's credential for an application is stored in a relational database. Which control protects the confidentiality of the credential while it is stored?
#175
What are the essential elements of a Risk Assessment Report (RAR)?
#176
The security operations center (SOC) has received credible intelligence that a threat actor is planning to attack with multiple variants of a destructive virus. After obtaining a sample set of this virus' variants and reverse engineering them to understand how they work, a commonality was found. All variants are coded to write to a specific memory location. It is determined this virus is of no threat to the organization because they had the foresight to enable what feature on all endpoints?
#177
The Chief Information Security Officer (CISO) is to establish a single, centralized, and relational repository to hold all information regarding the software and hardware assets. Which of the following s ions would be the BEST option?
#178
What type of investigation applies when malicious behavior is suspected between two organizations?
#179
Which of the following techniques evaluates the secure design principles of network or software architectures?
#180