ISC CISSP Practice Test - Questions Answers, Page 112
List of questions
Question 1111

During an internal audit of an organizational Information Security Management System (ISMS), nonconformities are identified. In which of the following management stages are nonconformities reviewed, assessed and/or corrected by the organization?
Question 1112

What is the BEST reason to include supply chain risks in a corporate risk register?
Question 1113

An employee's home address should be categorized according to which of the following references?
Question 1114

Why is authentication by ownership stronger than authentication by knowledge?
Question 1115

A network security engineer needs to ensure that a security solution analyzes traffic for protocol manipulation and various sorts of common attacks. In addition, all Uniform Resource Locator (URL) traffic must be inspected and users prevented from browsing inappropriate websites. Which of the following solutions should be implemented to enable administrators the capability to analyze traffic, blacklist external sites, and log user traffic for later analysis?
Question 1116

Which of the following is the BEST way to protect an organization's data assets?
Question 1117

Which of the following would qualify as an exception to the "right to be forgotten" of the General Data Protection Regulation's (GDPR)?
Question 1118

Which of the following is the name of an individual or group that is impacted by a change?
Question 1119

What is the MINIMUM standard for testing a disaster recovery plan (DRP)?
Question 1120

What is the MOST significant benefit of role-based access control (RBAC)?
Question