ISC CISSP Practice Test - Questions Answers, Page 131
List of questions
Question 1301

Which of the following regulations dictates how data breaches are handled?
Question 1302

Which of the following is fundamentally required to address potential security issues when initiating software development?
Question 1303

Which of the following is the BEST method a security practitioner can use to ensure that systems and sub-systems gracefully handle invalid input?
Question 1304

An information security administrator wishes to block peer-to-peer (P2P) traffic over Hypertext Transfer Protocol (HTTP) tunnels. Which of the following layers of the Open Systems Interconnection (OSI) model requires inspection?
Question 1305

An organization has requested storage area network (SAN) disks for a new project. What Redundant Array of Independent Disks (RAID) level provides the BEST redundancy and fault tolerance?
Question 1306

An organization has implemented a password complexity and an account lockout policy enforcing five incorrect logins tries within ten minutes. Network users have reported significantly increased account lockouts. Which of the following security principles is this company affecting?
Question 1307

In the last 15 years a company has experienced three electrical failures. The cost associated with each failure is listed below.
Which of the following would be a reasonable annual loss expectation?
Question 1308

Which of the following addresses requirements of security assessments during software acquisition?
Question 1309

Which of the following BEST obtains an objective audit of security controls?
Question 1310

Which of the following is established to collect information Se eee ee ee nation readily available in part through implemented security controls?
Question