ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 136

List of questions

Question 1351

Report Export Collapse

Which of the following features is MOST effective in mitigating against theft of data on a corporate mobile device which has been stolen?

Become a Premium Member for full access
  Unlock Premium Member

Question 1352

Report Export Collapse

An organization is implementing data encryption using symmetric ciphers and the Chief Information Officer (CIO) is concerned about the risk of using one key to protect all sensitive data, The security practitioner has been tasked with recommending a solution to address the CIO's concerns, Which of the following is the BEST approach to achieving the objective by encrypting all sensitive data?

Become a Premium Member for full access
  Unlock Premium Member

Question 1353

Report Export Collapse

International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 1354

Report Export Collapse

In software development, developers should use which type of queries to prevent a Structured Query Language (SQL) injection?

Become a Premium Member for full access
  Unlock Premium Member

Question 1355

Report Export Collapse

Which of the following BEST describes when an organization should conduct a black box security audit on a new software product?

Become a Premium Member for full access
  Unlock Premium Member

Question 1356

Report Export Collapse

The Chief Information Officer (CIO) has decided that as part of business modernization efforts the organization will move towards a cloud architecture. All business-critical data will be migrated to either internal or external cloud services within the next two years. The CIO has a PRIMARY obligation to work with personnel in which role in order to ensure proper protection of data during and after the cloud migration?

Become a Premium Member for full access
  Unlock Premium Member

Question 1357

Report Export Collapse

When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess?

Become a Premium Member for full access
  Unlock Premium Member

Question 1358

Report Export Collapse

Which of the following is a covert channel type?

Become a Premium Member for full access
  Unlock Premium Member

Question 1359

Report Export Collapse

Which change management role is responsible for the overall success of the project and supporting the change throughout the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 1360

Report Export Collapse

Which of the following is a unique feature of attribute-based access control (ABAC)?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search