ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 129

List of questions

Question 1281

Report Export Collapse

Which of the following is an example of a vulnerability of full-disk encryption (FDE)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1282

Report Export Collapse

What is the PRIMARY purpose of creating and reporting metrics for a security awareness, training, and education program?

Become a Premium Member for full access
  Unlock Premium Member

Question 1283

Report Export Collapse

Which one of the following BEST protects vendor accounts that are used for emergency maintenance?

Become a Premium Member for full access
  Unlock Premium Member

Question 1284

Report Export Collapse

Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?

Become a Premium Member for full access
  Unlock Premium Member

Question 1285

Report Export Collapse

The Industrial Control System (ICS) Computer Emergency Response Team (CERT) has released an alert regarding ICS-focused malware specifically propagating through Windows-based business networks. Technicians at a local water utility note that their dams, canals, and locks controlled by an internal Supervisory Control and Data Acquisition (SCADA) system have been malfunctioning. A digital forensics professional is consulted in the Incident Response (IR) and recovery. Which of the following is the MOST challenging aspect of this investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 1286

Report Export Collapse

To minimize the vulnerabilities of a web-based application, which of the following FIRST actions will lock down the system and minimize the risk of an attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 1287

Report Export Collapse

A hospital has allowed virtual private networking (VPN) access to remote database developers. Upon auditing the internal firewall configuration, the network administrator discovered that split-tunneling was enabled. What is the concern with this configuration?

Become a Premium Member for full access
  Unlock Premium Member

Question 1288

Report Export Collapse

A cloud hosting provider would like to provide a Service Organization Control (SOC) report relevant to its security program. This report should an abbreviated report that can be freely distributed. Which type of report BEST meets this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 1289

Report Export Collapse

What action should be taken by a business line that is unwilling to accept the residual risk in a system after implementing compensating controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 1290

Report Export Collapse

Which of the following BEST represents a defense in depth concept?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search