ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 113

Question list
Search
Search

List of questions

Search

Question 1121

Report
Export
Collapse

A software development company found odd behavior in some recently developed software, creating a need for a more thorough code review. What is the MOST effective argument for a more thorough code review?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1122

Report
Export
Collapse

A new site's gateway isn't able to form a tunnel to the existing site-to-site Internet Protocol Security (IPsec) virtual private network (VPN) device at headquarters. Devices at the new site have no problem accessing resources on the Internet. When testing connectivity between the remote site's gateway, it was observed that the external Internet Protocol (IP) address of the gateway was set to 192.168.1.1. and was configured to send outbound traffic to the Internet Service Provider (ISP) gateway at4 192.168.1.2. Which of the following would be the BEST way to resolve the issue and get the remote site connected?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1123

Report
Export
Collapse

Which of the following examples is BEST to minimize the attack surface for a customer's private information?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1124

Report
Export
Collapse

What are the essential elements of a Risk Assessment Report (RAR)?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1125

Report
Export
Collapse

What is the PRIMARY benefit of incident reporting and computer crime investigations?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1126

Report
Export
Collapse

Which of the following determines how traffic should flow based on the status of the infrastructure layer?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1127

Report
Export
Collapse

In a multi-tenant cloud environment, what approach will secure logical access to assets?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1128

Report
Export
Collapse

A company hired an external vendor to perform a penetration test ofa new payroll system. The company's internal test team had already performed an in-depth application and security test of the system and determined that it met security requirements. However, the external vendor uncovered significant security weaknesses where sensitive personal data was being sent unencrypted to the tax processing systems. What is the MOST likely cause of the security issues?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1129

Report
Export
Collapse

Which of the following is the MOST effective method of detecting vulnerabilities in web-based applications early in the secure Software Development Life Cycle (SDLC)?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1130

Report
Export
Collapse

A malicious user gains access to unprotected directories on a web server. Which of the following is MOST likely the cause for this information disclosure?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149