ISC CISSP Practice Test - Questions Answers, Page 121
List of questions
Related questions
Question 1201
Which of the following is a risk matrix?
Question 1202
Which evidence collecting technique would be utilized when it is believed an attacker is employing a rootkit and a quick analysis is needed?
Question 1203
A user is allowed to access the file labeled "Financial Forecast," but only between 9:00 a.m. and 5:00 p.m., Monday through Friday. Which type of access mechanism should be used to accomplish this?
Question 1204
An organization wants to share data securely with their partners via the Internet. Which standard port is typically used to meet this requirement?
Question 1205
Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?
Question 1206
Recently, an unknown event has disrupted a single Layer-2 network that spans between two geographically diverse data centers. The network engineers have asked for assistance in identifying the root cause of the event. Which of the following is the MOST likely cause?
Question 1207
What would be the BEST action to take in a situation where collected evidence was left unattended overnight in an unlocked vehicle?
Question 1208
Which of the following contributes MOST to the effectiveness of a security officer?
Question 1209
An organization wants a service provider to authenticate users via the users' organization domain credentials. Which markup language should the organization's security personnel use to support the integration?
Question 1210
A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system. What PRIMARY action should be taken to improve SIEM performance?
Question