ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 123

Question list
Search
Search

List of questions

Search

Question 1221

Report
Export
Collapse

Which of the following security tools monitors devices and records the information in a central database for further analysis?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1222

Report
Export
Collapse

Secure coding can be developed by applying which one of the following?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1223

Report
Export
Collapse

A company is moving from the V model to Agile development. How can the information security department BEST ensure that secure design principles are implemented in the new methodology?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1224

Report
Export
Collapse

An organization wants to define its physical perimeter. What primary device should be used to accomplish this objective if the organization's perimeter MUST cost-efficiently deter casual trespassers?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1225

Report
Export
Collapse

The acquisition of personal data being obtained by a lawful and fair means is an example of what principle?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1226

Report
Export
Collapse

What is the BEST control to be implemented at a login page in a web application to mitigate the ability to enumerate users?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1227

Report
Export
Collapse

If the wide area network (WAN) is supporting converged applications like Voice over Internet Protocol (VoIP), which of the following becomes even MORE essential to the assurance of network?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1228

Report
Export
Collapse

A cloud service accepts Security Assertion Markup Language (SAML) assertions from users to on and security However, an attacker was able to spoof a registered account on the network and query the SAML provider.

What is the MOST common attack leverage against this flaw?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1229

Report
Export
Collapse

A company is attempting to enhance the security of its user authentication processes. After evaluating several options, the company has decided to utilize Identity as a Service (IDaaS).

Which of the following factors leads the company to choose an IDaaS as their solution?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1230

Report
Export
Collapse

In which of the following system life cycle processes should security requirements be developed?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149