ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 113

Add to Whishlist

List of questions

Question 1121

Report Export Collapse

A software development company found odd behavior in some recently developed software, creating a need for a more thorough code review. What is the MOST effective argument for a more thorough code review?

Become a Premium Member for full access
  Unlock Premium Member

Question 1122

Report Export Collapse

A new site's gateway isn't able to form a tunnel to the existing site-to-site Internet Protocol Security (IPsec) virtual private network (VPN) device at headquarters. Devices at the new site have no problem accessing resources on the Internet. When testing connectivity between the remote site's gateway, it was observed that the external Internet Protocol (IP) address of the gateway was set to 192.168.1.1. and was configured to send outbound traffic to the Internet Service Provider (ISP) gateway at4 192.168.1.2. Which of the following would be the BEST way to resolve the issue and get the remote site connected?

Become a Premium Member for full access
  Unlock Premium Member

Question 1123

Report Export Collapse

Which of the following examples is BEST to minimize the attack surface for a customer's private information?

Become a Premium Member for full access
  Unlock Premium Member

Question 1124

Report Export Collapse

What are the essential elements of a Risk Assessment Report (RAR)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1125

Report Export Collapse

What is the PRIMARY benefit of incident reporting and computer crime investigations?

Become a Premium Member for full access
  Unlock Premium Member

Question 1126

Report Export Collapse

Which of the following determines how traffic should flow based on the status of the infrastructure layer?

Become a Premium Member for full access
  Unlock Premium Member

Question 1127

Report Export Collapse

In a multi-tenant cloud environment, what approach will secure logical access to assets?

Become a Premium Member for full access
  Unlock Premium Member

Question 1128

Report Export Collapse

A company hired an external vendor to perform a penetration test ofa new payroll system. The company's internal test team had already performed an in-depth application and security test of the system and determined that it met security requirements. However, the external vendor uncovered significant security weaknesses where sensitive personal data was being sent unencrypted to the tax processing systems. What is the MOST likely cause of the security issues?

Become a Premium Member for full access
  Unlock Premium Member

Question 1129

Report Export Collapse

Which of the following is the MOST effective method of detecting vulnerabilities in web-based applications early in the secure Software Development Life Cycle (SDLC)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1130

Report Export Collapse

A malicious user gains access to unprotected directories on a web server. Which of the following is MOST likely the cause for this information disclosure?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search