ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 134

List of questions

Question 1331

Report Export Collapse

A Chief Information Security Officer (CISO) of a firm which decided to migrate to cloud has been tasked with ensuring an optimal level of security. Which of the following would be the FIRST consideration?

Become a Premium Member for full access
  Unlock Premium Member

Question 1332

Report Export Collapse

Which technique helps system designers consider potential security concerns of their systems and applications?

Become a Premium Member for full access
  Unlock Premium Member

Question 1333

Report Export Collapse

What is the MOST important goal of conducting security assessments?

Become a Premium Member for full access
  Unlock Premium Member

Question 1334

Report Export Collapse

A hospital's building controls system monitors and operates the environmental equipment to maintain a safe and comfortable environment. Which of the following could be used to minimize the risk of utility supply interruption?

Become a Premium Member for full access
  Unlock Premium Member

Question 1335

Report Export Collapse

To monitor the security of buried data lines inside the perimeter of a facility, which of the following is the MOST effective control?

Become a Premium Member for full access
  Unlock Premium Member

Question 1336

Report Export Collapse

What is the BEST method to use for assessing the security impact of acquired software?

Become a Premium Member for full access
  Unlock Premium Member

Question 1337

Report Export Collapse

Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?

Become a Premium Member for full access
  Unlock Premium Member

Question 1338

Report Export Collapse

Which of the following factors should be considered characteristics of Attribute Based Access Control (ABAC) in terms of the attributes used?

Become a Premium Member for full access
  Unlock Premium Member

Question 1339

Report Export Collapse

A security architect is developing an information system for a client. One of the requirements is to deliver a platform that mitigates against common vulnerabilities and attacks, What is the MOST efficient option used to prevent buffer overflow attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 1340

Report Export Collapse

A security engineer is assigned to work with the patch and vulnerability management group. The deployment of a new patch has been approved and needs to be applied.

The research is complete, and the security engineer has provided recommendations. Where should the patch be applied FIRST?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search