ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 124

Question list
Search
Search

List of questions

Search

Question 1231

Report
Export
Collapse

Which of the following virtual network configuration options is BEST to protect virtual machines (VM)?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1232

Report
Export
Collapse

Which of the following is the BEST method to validate secure coding techniques against injection and overflow attacks?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1233

Report
Export
Collapse

A Distributed Denial of Service (DDoS) attack was carried out using malware called Mirai to create a large-scale command and control system to launch a botnet. Which of the following devices were the PRIMARY sources used to generate the attack traffic?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1234

Report
Export
Collapse

An establish information technology (IT) consulting firm is considering acquiring a successful local startup. To gain a comprehensive understanding of the startup's security posture' which type of assessment provides the BEST information?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1235

Report
Export
Collapse

As a design principle, which one of the following actors is responsible for identifying and approving data security requirements in a cloud ecosystem?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1236

Report
Export
Collapse

A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed. The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1237

Report
Export
Collapse

In supervisory control and data acquisition (SCADA) systems, which of the following controls can be used to reduce device exposure to malware?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1238

Report
Export
Collapse

What is considered a compensating control for not having electrical surge protectors installed?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1239

Report
Export
Collapse

What is considered the BEST when determining whether to provide remote network access to a third-party security service?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1240

Report
Export
Collapse

When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149