ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 127

Question list
Search
Search

List of questions

Search

Question 1261

Report
Export
Collapse

Information security practitioners are in the midst of implementing a new firewall. Which of the following failure methods would BEST prioritize security in the event of failure?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1262

Report
Export
Collapse

Which of the following is a PRIMARY security weakness in the design of Domain Name System (DNS)?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1263

Report
Export
Collapse

Which of the following BEST describes the purpose of the reference monitor when defining access control to enforce the security model?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1264

Report
Export
Collapse

A project manager for a large software firm has acquired a government contract that generates large amounts of Controlled Unclassified Information (CUI). The organization's information security manager has received a request to transfer project-related CUI between systems of differing security classifications. What role provides the authoritative guidance for this transfer?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1265

Report
Export
Collapse

Which of the following protects personally identifiable information (PII) used by financial services organizations?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1266

Report
Export
Collapse

Which of the following is a common term for log reviews, synthetic transactions, and code reviews?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1267

Report
Export
Collapse

At what stage of the Software Development Life Cycle (SDLC) does software vulnerability remediation MOST likely cost the least to implement?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1268

Report
Export
Collapse

Clothing retailer employees are provisioned with user accounts that provide access to resources at partner businesses. All partner businesses use common identity and access management (IAM) protocols and differing technologies. Under the Extended Identity principle, what is the process flow between partner businesses to allow this TAM action?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1269

Report
Export
Collapse

Using Address Space Layout Randomization (ASLR) reduces the potential for which of the following attacks?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1270

Report
Export
Collapse

Which of the following ensures old log data is not overwritten?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149