ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 127

List of questions

Question 1261

Report Export Collapse

Information security practitioners are in the midst of implementing a new firewall. Which of the following failure methods would BEST prioritize security in the event of failure?

Become a Premium Member for full access
  Unlock Premium Member

Question 1262

Report Export Collapse

Which of the following is a PRIMARY security weakness in the design of Domain Name System (DNS)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1263

Report Export Collapse

Which of the following BEST describes the purpose of the reference monitor when defining access control to enforce the security model?

Become a Premium Member for full access
  Unlock Premium Member

Question 1264

Report Export Collapse

A project manager for a large software firm has acquired a government contract that generates large amounts of Controlled Unclassified Information (CUI). The organization's information security manager has received a request to transfer project-related CUI between systems of differing security classifications. What role provides the authoritative guidance for this transfer?

Become a Premium Member for full access
  Unlock Premium Member

Question 1265

Report Export Collapse

Which of the following protects personally identifiable information (PII) used by financial services organizations?

Become a Premium Member for full access
  Unlock Premium Member

Question 1266

Report Export Collapse

Which of the following is a common term for log reviews, synthetic transactions, and code reviews?

Become a Premium Member for full access
  Unlock Premium Member

Question 1267

Report Export Collapse

At what stage of the Software Development Life Cycle (SDLC) does software vulnerability remediation MOST likely cost the least to implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 1268

Report Export Collapse

Clothing retailer employees are provisioned with user accounts that provide access to resources at partner businesses. All partner businesses use common identity and access management (IAM) protocols and differing technologies. Under the Extended Identity principle, what is the process flow between partner businesses to allow this TAM action?

Become a Premium Member for full access
  Unlock Premium Member

Question 1269

Report Export Collapse

Using Address Space Layout Randomization (ASLR) reduces the potential for which of the following attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 1270

Report Export Collapse

Which of the following ensures old log data is not overwritten?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search