ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 138

Question list
Search
Search

List of questions

Search

Question 1371

Report
Export
Collapse

Which is MOST important when negotiating an Internet service provider (ISP) service-level agreement (SLA) by an organization that solely provides Voice over Internet Protocol (VoIP) services?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1372

Report
Export
Collapse

A company developed a web application which is sold as a Software as a Service (SaaS) solution to the customer. The application is hosted by a web server running on a 'specific operating system (OS) on a virtual machine (VM). During the transition phase of the service, it is determined that the support team will need access to the application logs. Which of the following privileges would be the MOST suitable?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1373

Report
Export
Collapse

A systems engineer is designing a wide area network (WAN) environment for a new organization. The WAN will connect sites holding information at various levels of sensitivity, from publicly available to highly confidential. The organization requires a high degree of interconnectedness to support existing business processes. What is the BEST design approach to securing this environment?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1374

Report
Export
Collapse

Which event magnitude is defined as deadly, destructive, and disruptive when a hazard interacts with human vulnerability?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1375

Report
Export
Collapse

Which of the following goals represents a modern shift in risk management according to National Institute of Standards and Technology (NIST)?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1376

Report
Export
Collapse

A web developer is completing a new web application security checklist before releasing the application to production. the task of disabling unecessary services is on the checklist. Which web application threat is being mitigated by this action?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1377

Report
Export
Collapse

Which of the following is a limitation of the Bell-LaPadula model?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1378

Report
Export
Collapse

Which of the following is the BEST option to reduce the network attack surface of a system?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1379

Report
Export
Collapse

Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1380

Report
Export
Collapse

A financial organization that works according to agile principles has developed a new application for their external customer base to request a line of credit. A security analyst has been asked to assess the security risk of the minimum viable product (MVP). Which is the MOST important activity the analyst should assess?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149