ISC CISSP Practice Test - Questions Answers, Page 121
List of questions
Question 1201

Which of the following is a risk matrix?
Question 1202

Which evidence collecting technique would be utilized when it is believed an attacker is employing a rootkit and a quick analysis is needed?
Question 1203

A user is allowed to access the file labeled "Financial Forecast," but only between 9:00 a.m. and 5:00 p.m., Monday through Friday. Which type of access mechanism should be used to accomplish this?
Question 1204

An organization wants to share data securely with their partners via the Internet. Which standard port is typically used to meet this requirement?
Question 1205

Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?
Question 1206

Recently, an unknown event has disrupted a single Layer-2 network that spans between two geographically diverse data centers. The network engineers have asked for assistance in identifying the root cause of the event. Which of the following is the MOST likely cause?
Question 1207

What would be the BEST action to take in a situation where collected evidence was left unattended overnight in an unlocked vehicle?
Question 1208

Which of the following contributes MOST to the effectiveness of a security officer?
Question 1209

An organization wants a service provider to authenticate users via the users' organization domain credentials. Which markup language should the organization's security personnel use to support the integration?
Question 1210

A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system. What PRIMARY action should be taken to improve SIEM performance?
Question