ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 125

Question list
Search
Search

List of questions

Search

Question 1241

Report
Export
Collapse

What is the FIRST step in reducing the exposure of a network to Internet Control Message Protocol (ICMP) based attacks?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1242

Report
Export
Collapse

A system developer has a requirement for an application to check for a secure digital signature before the application is accessed on a user's laptop. Which security mechanism addresses this requirement?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1243

Report
Export
Collapse

The security organization is looking for a solution that could help them determine with a strong level of confidence that attackers have breached their network. Which solution is MOST effective at discovering a successful network breach?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1244

Report
Export
Collapse

A security architect is reviewing plans for an application with a Recovery Point Objective (RPO) of 15 minutes. The current design has all of the application infrastructure located within one co-location data center. Which security principle is the architect currently assessing?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1245

Report
Export
Collapse

Which of the following outsourcing agreement provisions has the HIGHEST priority from a security operations perspective?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1246

Report
Export
Collapse

When designing a Cyber-Physical System (CPS), which of the following should be a security practitioner's first consideration?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1247

Report
Export
Collapse

A security professional was tasked with rebuilding a company's wireless infrastructure. Which of the following are the MOST important factors to consider while making a decision on which wireless spectrum to deploy?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1248

Report
Export
Collapse

A subscription service which provides power, climate control, raised flooring, and telephone wiring but NOT the computer and peripheral equipment is BEST described as a:

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1249

Report
Export
Collapse

Which of the following is the PRIMARY goal of logical access controls?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1250

Report
Export
Collapse

The ability to send malicious code, generally in the form of a client side script, to a different end user is categorized as which type of vulnerability?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149