ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 123

List of questions

Question 1221

Report Export Collapse

Which of the following security tools monitors devices and records the information in a central database for further analysis?

Become a Premium Member for full access
  Unlock Premium Member

Question 1222

Report Export Collapse

Secure coding can be developed by applying which one of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 1223

Report Export Collapse

A company is moving from the V model to Agile development. How can the information security department BEST ensure that secure design principles are implemented in the new methodology?

Become a Premium Member for full access
  Unlock Premium Member

Question 1224

Report Export Collapse

An organization wants to define its physical perimeter. What primary device should be used to accomplish this objective if the organization's perimeter MUST cost-efficiently deter casual trespassers?

Become a Premium Member for full access
  Unlock Premium Member

Question 1225

Report Export Collapse

The acquisition of personal data being obtained by a lawful and fair means is an example of what principle?

Become a Premium Member for full access
  Unlock Premium Member

Question 1226

Report Export Collapse

What is the BEST control to be implemented at a login page in a web application to mitigate the ability to enumerate users?

Become a Premium Member for full access
  Unlock Premium Member

Question 1227

Report Export Collapse

If the wide area network (WAN) is supporting converged applications like Voice over Internet Protocol (VoIP), which of the following becomes even MORE essential to the assurance of network?

Become a Premium Member for full access
  Unlock Premium Member

Question 1228

Report Export Collapse

A cloud service accepts Security Assertion Markup Language (SAML) assertions from users to on and security However, an attacker was able to spoof a registered account on the network and query the SAML provider.

What is the MOST common attack leverage against this flaw?

Become a Premium Member for full access
  Unlock Premium Member

Question 1229

Report Export Collapse

A company is attempting to enhance the security of its user authentication processes. After evaluating several options, the company has decided to utilize Identity as a Service (IDaaS).

Which of the following factors leads the company to choose an IDaaS as their solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 1230

Report Export Collapse

In which of the following system life cycle processes should security requirements be developed?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search