ISC CISSP Practice Test - Questions Answers, Page 118
List of questions
Related questions
Question 1171
In the "Do" phase of the Plan-Do-Check-Act model, which of the following is performed?
Question 1172
Commercial off-the-shelf (COTS) software presents which of the following additional security concerns?
Question 1173
What is the correct order of execution for security architecture?
Question 1174
Which of the following is the PRIMARY purpose of due diligence when an organization embarks on a merger or acquisition?
Question 1175
What should be used to determine the risks associated with using Software as a Service (SaaS) for collaboration and email?
Question 1176
A federal agency has hired an auditor to perform penetration testing on a critical system as part of the mandatory, annual Federal Information Security Management Act (FISMA) security assessments.
The auditor is new to this system but has extensive experience with all types of penetration testing.
The auditor has decided to begin with sniffing network traffic. What type of penetration testing is the auditor conducting?
Question 1177
A software developer wishes to write code that will execute safely and only as intended. Which of the following programming language types is MOST likely to achieve this goal?
Question 1178
A security professional has been assigned to assess a web application. The assessment report recommends switching to Security Assertion Markup Language (SAML). What is the PRIMARY security benefit in switching to SAML?
Question 1179
What is the MOST common security risk of a mobile device?
Question 1180
Which of the following protection is provided when using a Virtual Private Network (VPN) with Authentication Header (AH)?
Question