ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 126

List of questions

Question 1251

Report Export Collapse

The security architect has been mandated to assess the security of various brands of mobile devices.

At what phase of the product lifecycle would this be MOST likely to occur?

Become a Premium Member for full access
  Unlock Premium Member

Question 1252

Report Export Collapse

A hacker can use a lockout capability to start which of the following attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 1253

Report Export Collapse

An Internet media company produces and broadcasts highly popular television shows. The company is suffering a huge revenue loss due to piracy. What technique should be used to track the distribution of content?

Become a Premium Member for full access
  Unlock Premium Member

Question 1254

Report Export Collapse

Using the cipher text and resultant clear text message to derive the non-alphabetic cipher key is an example of which method of cryptanalytic attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 1255

Report Export Collapse

All hosts on the network are sending logs via syslog-ng to the log collector. The log collector is behind its own firewall, The security professional wants to make sure not to put extra load on the firewall due to the amount of traffic that is passing through it. Which of the following types of filtering would MOST likely be used?

Become a Premium Member for full access
  Unlock Premium Member

Question 1256

Report Export Collapse

An organization has been collecting a large amount of redundant and unusable data and filling up the storage area network (SAN). Management has requested the identification of a solution that will address ongoing storage problems.

Which is the BEST technical solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 1257

Report Export Collapse

A security practitioner has been asked to model best practices for disaster recovery (DR) and business continuity. The practitioner has decided that a formal committee is needed to establish a business continuity policy. Which of the following BEST describes this stage of business continuity development?

Become a Premium Member for full access
  Unlock Premium Member

Question 1258

Report Export Collapse

What is the MOST appropriate hierarchy of documents when implementing a security program?

Become a Premium Member for full access
  Unlock Premium Member

Question 1259

Report Export Collapse

Which of the following is the MOST common cause of system or security failures?

Become a Premium Member for full access
  Unlock Premium Member

Question 1260

Report Export Collapse

Which access control method is based on users issuing access requests on system resources, features assigned to those resources, the operational or situational context, and a set of policies specified in terms of those features and context?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search