ISC CISSP Practice Test - Questions Answers, Page 112
List of questions
Related questions
During an internal audit of an organizational Information Security Management System (ISMS), nonconformities are identified. In which of the following management stages are nonconformities reviewed, assessed and/or corrected by the organization?
What is the BEST reason to include supply chain risks in a corporate risk register?
An employee's home address should be categorized according to which of the following references?
Why is authentication by ownership stronger than authentication by knowledge?
A network security engineer needs to ensure that a security solution analyzes traffic for protocol manipulation and various sorts of common attacks. In addition, all Uniform Resource Locator (URL) traffic must be inspected and users prevented from browsing inappropriate websites. Which of the following solutions should be implemented to enable administrators the capability to analyze traffic, blacklist external sites, and log user traffic for later analysis?
Which of the following is the BEST way to protect an organization's data assets?
Which of the following would qualify as an exception to the "right to be forgotten" of the General Data Protection Regulation's (GDPR)?
Which of the following is the name of an individual or group that is impacted by a change?
What is the MINIMUM standard for testing a disaster recovery plan (DRP)?
What is the MOST significant benefit of role-based access control (RBAC)?
Question