Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ISC CISSP Practice Exam with Questions & Answers | Set: 6

Questions 76

What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?

Options:
A.

Warm site

B.

Hot site

C.

Mirror site

D.

Cold site

ISC CISSP Premium Access
Questions 77

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?

Options:
A.

Continuously without exception for all security controls

B.

Before and after each change of the control

C.

At a rate concurrent with the volatility of the security control

D.

Only during system implementation and decommissioning

Questions 78

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

Options:
A.

Absence of a Business Intelligence (BI) solution

B.

Inadequate cost modeling

C.

Improper deployment of the Service-Oriented Architecture (SOA)

D.

Insufficient Service Level Agreement (SLA)

Questions 79

Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?

Options:
A.

Hardware and software compatibility issues

B.

Applications’ critically and downtime tolerance

C.

Budget constraints and requirements

D.

Cost/benefit analysis and business objectives

Questions 80

Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?

Options:
A.

Walkthrough

B.

Simulation

C.

Parallel

D.

White box

Questions 81

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

Options:
A.

Guaranteed recovery of all business functions

B.

Minimization of the need decision making during a crisis

C.

Insurance against litigation following a disaster

D.

Protection from loss of organization resources

Questions 82

A continuous information security-monitoring program can BEST reduce risk through which of the following?

Options:
A.

Collecting security events and correlating them to identify anomalies

B.

Facilitating system-wide visibility into the activities of critical user accounts

C.

Encompassing people, process, and technology

D.

Logging both scheduled and unscheduled system changes

Questions 83

What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?

Options:
A.

Disable all unnecessary services

B.

Ensure chain of custody

C.

Prepare another backup of the system

D.

Isolate the system from the network

Questions 84

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

Options:
A.

Layer 2 Tunneling Protocol (L2TP)

B.

Link Control Protocol (LCP)

C.

Challenge Handshake Authentication Protocol (CHAP)

D.

Packet Transfer Protocol (PTP)

Questions 85

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?

Options:
A.

Intrusion Prevention Systems (IPS)

B.

Intrusion Detection Systems (IDS)

C.

Stateful firewalls

D.

Network Behavior Analysis (NBA) tools

Questions 86

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

Options:
A.

Implement packet filtering on the network firewalls

B.

Install Host Based Intrusion Detection Systems (HIDS)

C.

Require strong authentication for administrators

D.

Implement logical network segmentation at the switches

Questions 87

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?

Options:
A.

Add a new rule to the application layer firewall

B.

Block access to the service

C.

Install an Intrusion Detection System (IDS)

D.

Patch the application source code

Questions 88

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

Options:
A.

Transport layer

B.

Application layer

C.

Network layer

D.

Session layer

Questions 89

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

Options:
A.

Packet filtering

B.

Port services filtering

C.

Content filtering

D.

Application access control

Questions 90

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

Options:
A.

Link layer

B.

Physical layer

C.

Session layer

D.

Application layer