ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 129

Question list
Search

List of questions

Search

Question 1281

Report
Export
Collapse

Which of the following is an example of a vulnerability of full-disk encryption (FDE)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1282

Report
Export
Collapse

What is the PRIMARY purpose of creating and reporting metrics for a security awareness, training, and education program?

Become a Premium Member for full access
  Unlock Premium Member

Question 1283

Report
Export
Collapse

Which one of the following BEST protects vendor accounts that are used for emergency maintenance?

Become a Premium Member for full access
  Unlock Premium Member

Question 1284

Report
Export
Collapse

Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?

Become a Premium Member for full access
  Unlock Premium Member

Question 1285

Report
Export
Collapse

The Industrial Control System (ICS) Computer Emergency Response Team (CERT) has released an alert regarding ICS-focused malware specifically propagating through Windows-based business networks. Technicians at a local water utility note that their dams, canals, and locks controlled by an internal Supervisory Control and Data Acquisition (SCADA) system have been malfunctioning. A digital forensics professional is consulted in the Incident Response (IR) and recovery. Which of the following is the MOST challenging aspect of this investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 1286

Report
Export
Collapse

To minimize the vulnerabilities of a web-based application, which of the following FIRST actions will lock down the system and minimize the risk of an attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 1287

Report
Export
Collapse

A hospital has allowed virtual private networking (VPN) access to remote database developers. Upon auditing the internal firewall configuration, the network administrator discovered that split-tunneling was enabled. What is the concern with this configuration?

Become a Premium Member for full access
  Unlock Premium Member

Question 1288

Report
Export
Collapse

A cloud hosting provider would like to provide a Service Organization Control (SOC) report relevant to its security program. This report should an abbreviated report that can be freely distributed. Which type of report BEST meets this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 1289

Report
Export
Collapse

What action should be taken by a business line that is unwilling to accept the residual risk in a system after implementing compensating controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 1290

Report
Export
Collapse

Which of the following BEST represents a defense in depth concept?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149