ISC CISSP Practice Test - Questions Answers, Page 129
List of questions
Related questions
Which of the following is an example of a vulnerability of full-disk encryption (FDE)?
What is the PRIMARY purpose of creating and reporting metrics for a security awareness, training, and education program?
Which one of the following BEST protects vendor accounts that are used for emergency maintenance?
Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?
The Industrial Control System (ICS) Computer Emergency Response Team (CERT) has released an alert regarding ICS-focused malware specifically propagating through Windows-based business networks. Technicians at a local water utility note that their dams, canals, and locks controlled by an internal Supervisory Control and Data Acquisition (SCADA) system have been malfunctioning. A digital forensics professional is consulted in the Incident Response (IR) and recovery. Which of the following is the MOST challenging aspect of this investigation?
To minimize the vulnerabilities of a web-based application, which of the following FIRST actions will lock down the system and minimize the risk of an attack?
A hospital has allowed virtual private networking (VPN) access to remote database developers. Upon auditing the internal firewall configuration, the network administrator discovered that split-tunneling was enabled. What is the concern with this configuration?
A cloud hosting provider would like to provide a Service Organization Control (SOC) report relevant to its security program. This report should an abbreviated report that can be freely distributed. Which type of report BEST meets this requirement?
What action should be taken by a business line that is unwilling to accept the residual risk in a system after implementing compensating controls?
Which of the following BEST represents a defense in depth concept?
Question