ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 136

Question list
Search
Search

List of questions

Search

Question 1351

Report
Export
Collapse

Which of the following features is MOST effective in mitigating against theft of data on a corporate mobile device which has been stolen?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1352

Report
Export
Collapse

An organization is implementing data encryption using symmetric ciphers and the Chief Information Officer (CIO) is concerned about the risk of using one key to protect all sensitive data, The security practitioner has been tasked with recommending a solution to address the CIO's concerns, Which of the following is the BEST approach to achieving the objective by encrypting all sensitive data?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1353

Report
Export
Collapse

International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1354

Report
Export
Collapse

In software development, developers should use which type of queries to prevent a Structured Query Language (SQL) injection?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1355

Report
Export
Collapse

Which of the following BEST describes when an organization should conduct a black box security audit on a new software product?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1356

Report
Export
Collapse

The Chief Information Officer (CIO) has decided that as part of business modernization efforts the organization will move towards a cloud architecture. All business-critical data will be migrated to either internal or external cloud services within the next two years. The CIO has a PRIMARY obligation to work with personnel in which role in order to ensure proper protection of data during and after the cloud migration?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1357

Report
Export
Collapse

When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1358

Report
Export
Collapse

Which of the following is a covert channel type?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1359

Report
Export
Collapse

Which change management role is responsible for the overall success of the project and supporting the change throughout the organization?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1360

Report
Export
Collapse

Which of the following is a unique feature of attribute-based access control (ABAC)?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149