ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 137

List of questions

Question 1361

Report Export Collapse

When auditing the Software Development Life Cycle (SDLC) which of the following is one of the highlevel audit phases?

Become a Premium Member for full access
  Unlock Premium Member

Question 1362

Report Export Collapse

Which of the following BEST describes the purpose of Border Gateway Protocol (BGP)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1363

Report Export Collapse

Which of the following is the PRIMARY purpose of installing a mantrap within a facility?

Become a Premium Member for full access
  Unlock Premium Member

Question 1364

Report Export Collapse

A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in ?

Become a Premium Member for full access
  Unlock Premium Member

Question 1365

Report Export Collapse

Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?

Become a Premium Member for full access
  Unlock Premium Member

Question 1366

Report Export Collapse

An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1367

Report Export Collapse

Which of the following has the responsibility of information technology (IT) governance?

Become a Premium Member for full access
  Unlock Premium Member

Question 1368

Report Export Collapse

Dumpster diving is a technique used in which stage of penetration testing methodology?

Become a Premium Member for full access
  Unlock Premium Member

Question 1369

Report Export Collapse

What is the MOST common cause of Remote Desktop Protocol (RDP) compromise?

Become a Premium Member for full access
  Unlock Premium Member

Question 1370

Report Export Collapse

An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference architecture would mobile devices be tracked?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149