ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 118

Question list
Search
Search

Question 1171

Report
Export
Collapse

In the "Do" phase of the Plan-Do-Check-Act model, which of the following is performed?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1172

Report
Export
Collapse

Commercial off-the-shelf (COTS) software presents which of the following additional security concerns?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1173

Report
Export
Collapse

What is the correct order of execution for security architecture?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1174

Report
Export
Collapse

Which of the following is the PRIMARY purpose of due diligence when an organization embarks on a merger or acquisition?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1175

Report
Export
Collapse

What should be used to determine the risks associated with using Software as a Service (SaaS) for collaboration and email?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1176

Report
Export
Collapse

A federal agency has hired an auditor to perform penetration testing on a critical system as part of the mandatory, annual Federal Information Security Management Act (FISMA) security assessments.

The auditor is new to this system but has extensive experience with all types of penetration testing.

The auditor has decided to begin with sniffing network traffic. What type of penetration testing is the auditor conducting?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1177

Report
Export
Collapse

A software developer wishes to write code that will execute safely and only as intended. Which of the following programming language types is MOST likely to achieve this goal?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1178

Report
Export
Collapse

A security professional has been assigned to assess a web application. The assessment report recommends switching to Security Assertion Markup Language (SAML). What is the PRIMARY security benefit in switching to SAML?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1179

Report
Export
Collapse

What is the MOST common security risk of a mobile device?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1180

Report
Export
Collapse

Which of the following protection is provided when using a Virtual Private Network (VPN) with Authentication Header (AH)?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149