ISC CISSP Practice Test - Questions Answers, Page 118
List of questions
Related questions
In the "Do" phase of the Plan-Do-Check-Act model, which of the following is performed?
Commercial off-the-shelf (COTS) software presents which of the following additional security concerns?
What is the correct order of execution for security architecture?
Which of the following is the PRIMARY purpose of due diligence when an organization embarks on a merger or acquisition?
What should be used to determine the risks associated with using Software as a Service (SaaS) for collaboration and email?
A federal agency has hired an auditor to perform penetration testing on a critical system as part of the mandatory, annual Federal Information Security Management Act (FISMA) security assessments.
The auditor is new to this system but has extensive experience with all types of penetration testing.
The auditor has decided to begin with sniffing network traffic. What type of penetration testing is the auditor conducting?
A software developer wishes to write code that will execute safely and only as intended. Which of the following programming language types is MOST likely to achieve this goal?
A security professional has been assigned to assess a web application. The assessment report recommends switching to Security Assertion Markup Language (SAML). What is the PRIMARY security benefit in switching to SAML?
What is the MOST common security risk of a mobile device?
Which of the following protection is provided when using a Virtual Private Network (VPN) with Authentication Header (AH)?
Question