ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 114

List of questions

Question 1131

Report Export Collapse

Which of the following security objectives for industrial control systems (ICS) can be adapted to securing any Internet of Things (IoT) system?

Become a Premium Member for full access
  Unlock Premium Member

Question 1132

Report Export Collapse

Wi-Fi Protected Access 2 (WPA2) provides users with a higher level of assurance that their data will remain protected by using which protocol?

Become a Premium Member for full access
  Unlock Premium Member

Question 1133

Report Export Collapse

A software development company has a short timeline in which to deliver a software product. The software development team decides to use open-source software libraries to reduce the development time. What concept should software developers consider when using open-source software libraries?

Become a Premium Member for full access
  Unlock Premium Member

Question 1134

Report Export Collapse

According to the (ISC)? ethics canon "act honorably, honestly, justly, responsibly, and legally," which order should be used when resolving conflicts?

Become a Premium Member for full access
  Unlock Premium Member

Question 1135

Report Export Collapse

When conducting a remote access session using Internet Protocol Security (IPSec), which Open Systems Interconnection (OSI) model layer does this connection use?

Become a Premium Member for full access
  Unlock Premium Member

Question 1136

Report Export Collapse

Which of the following types of web-based attack is happening when an attacker is able to send a well-crafted, malicious request to an authenticated user without the user realizing it?

Become a Premium Member for full access
  Unlock Premium Member

Question 1137

Report Export Collapse

When reviewing the security logs, the password shown for an administrative login event was ' OR ' '1'='1' --. This is an example of which of the following kinds of attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 1138

Report Export Collapse

An organization's internal audit team performed a security audit on the company's system and reported that the manufacturing application is rarely updated along with other issues categorized as minor. Six months later, an external audit team reviewed the same system with the same scope, but identified severe weaknesses in the manufacturing application's security controls. What is MOST likely to be the root cause of the internal audit team's failure in detecting these security issues?

Become a Premium Member for full access
  Unlock Premium Member

Question 1139

Report Export Collapse

Which audit type is MOST appropriate for evaluating the effectiveness of a security program?

Become a Premium Member for full access
  Unlock Premium Member

Question 1140

Report Export Collapse

The development team has been tasked with collecting data from biometric devices. The application will support a variety of collection data streams. During the testing phase, the team utilizes data from an old production database in a secure testing environment. What principle has the team taken into consideration?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search