ISC CISSP Practice Test - Questions Answers, Page 137
List of questions
Question 1361
When auditing the Software Development Life Cycle (SDLC) which of the following is one of the highlevel audit phases?
Question 1362
Which of the following BEST describes the purpose of Border Gateway Protocol (BGP)?
Question 1363
Which of the following is the PRIMARY purpose of installing a mantrap within a facility?
Question 1364
A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in ?
Question 1365
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
Question 1366
An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?
Question 1367
Which of the following has the responsibility of information technology (IT) governance?
Question 1368
Dumpster diving is a technique used in which stage of penetration testing methodology?
Question 1369
What is the MOST common cause of Remote Desktop Protocol (RDP) compromise?
Question 1370
An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference architecture would mobile devices be tracked?
Question