ISC CISSP Practice Test - Questions Answers, Page 108
List of questions
Related questions
Which of the following is a secure design principle for a new product?
An application developer receives a report back from the security team showing their automated tools were able to successfully enter unexpected data into the organization's customer service portal, causing the site to crash. This is an example of which type of testing?
An organization has determined that its previous waterfall approach to software development is not keeping pace with business demands. To adapt to the rapid changes required for product delivery, the organization has decided to move towards an Agile software development and release cycle. In order to ensure the success of the Agile methodology, who is MOST critical in creating acceptance tests or acceptance criteria for each release?
A hospital enforces the Code of Fair Information Practices. What practice applies to a patient requesting their medical records from a web portal?
When designing a new Voice over Internet Protocol (VoIP) network, an organization's top concern is preventing unauthorized users accessing the VoIP network. Which of the following will BEST help secure the VoIP network?
What is the PRIMARY objective of the post-incident phase of the incident response process in the security operations center (SOC)?
An international organization has decided to use a Software as a Service (SaaS) solution to support its business operations. Which of the following compliance standards should the organization use to assess the international code security and data privacy of the solution?
Which of the following actions should be undertaken prior to deciding on a physical baseline Protection Profile (PP)?
A criminal organization is planning an attack on a government network. Which of the following scenarios presents the HIGHEST risk to the organization?
A Certified Information Systems Security Professional (CISSP) with identity and access management (IAM) responsibilities is asked by the Chief Information Security Officer (CISO) to4 perform a vulnerability assessment on a web application to pass a Payment Card Industry (PCI) audit. The CISSP has never performed this before. According to the (ISC)? Code of Professional Ethics, which of the following should the CISSP do?
Question