ISC CISSP Practice Test - Questions Answers, Page 113
List of questions
Related questions
Question 1121
A software development company found odd behavior in some recently developed software, creating a need for a more thorough code review. What is the MOST effective argument for a more thorough code review?
Question 1122
A new site's gateway isn't able to form a tunnel to the existing site-to-site Internet Protocol Security (IPsec) virtual private network (VPN) device at headquarters. Devices at the new site have no problem accessing resources on the Internet. When testing connectivity between the remote site's gateway, it was observed that the external Internet Protocol (IP) address of the gateway was set to 192.168.1.1. and was configured to send outbound traffic to the Internet Service Provider (ISP) gateway at4 192.168.1.2. Which of the following would be the BEST way to resolve the issue and get the remote site connected?
Question 1123
Which of the following examples is BEST to minimize the attack surface for a customer's private information?
Question 1124
What are the essential elements of a Risk Assessment Report (RAR)?
Question 1125
What is the PRIMARY benefit of incident reporting and computer crime investigations?
Question 1126
Which of the following determines how traffic should flow based on the status of the infrastructure layer?
Question 1127
In a multi-tenant cloud environment, what approach will secure logical access to assets?
Question 1128
A company hired an external vendor to perform a penetration test ofa new payroll system. The company's internal test team had already performed an in-depth application and security test of the system and determined that it met security requirements. However, the external vendor uncovered significant security weaknesses where sensitive personal data was being sent unencrypted to the tax processing systems. What is the MOST likely cause of the security issues?
Question 1129
Which of the following is the MOST effective method of detecting vulnerabilities in web-based applications early in the secure Software Development Life Cycle (SDLC)?
Question 1130
A malicious user gains access to unprotected directories on a web server. Which of the following is MOST likely the cause for this information disclosure?
Question