ISC CISSP Practice Test - Questions Answers, Page 112
List of questions
Question 1111
During an internal audit of an organizational Information Security Management System (ISMS), nonconformities are identified. In which of the following management stages are nonconformities reviewed, assessed and/or corrected by the organization?
Question 1112
What is the BEST reason to include supply chain risks in a corporate risk register?
Question 1113
An employee's home address should be categorized according to which of the following references?
Question 1114
Why is authentication by ownership stronger than authentication by knowledge?
Question 1115
A network security engineer needs to ensure that a security solution analyzes traffic for protocol manipulation and various sorts of common attacks. In addition, all Uniform Resource Locator (URL) traffic must be inspected and users prevented from browsing inappropriate websites. Which of the following solutions should be implemented to enable administrators the capability to analyze traffic, blacklist external sites, and log user traffic for later analysis?
Question 1116
Which of the following is the BEST way to protect an organization's data assets?
Question 1117
Which of the following would qualify as an exception to the "right to be forgotten" of the General Data Protection Regulation's (GDPR)?
Question 1118
Which of the following is the name of an individual or group that is impacted by a change?
Question 1119
What is the MINIMUM standard for testing a disaster recovery plan (DRP)?
Question 1120
What is the MOST significant benefit of role-based access control (RBAC)?
        
 
                                            
Question