ISC CISSP Practice Test - Questions Answers, Page 138
List of questions
Related questions
Question 1371
Which is MOST important when negotiating an Internet service provider (ISP) service-level agreement (SLA) by an organization that solely provides Voice over Internet Protocol (VoIP) services?
Question 1372
A company developed a web application which is sold as a Software as a Service (SaaS) solution to the customer. The application is hosted by a web server running on a 'specific operating system (OS) on a virtual machine (VM). During the transition phase of the service, it is determined that the support team will need access to the application logs. Which of the following privileges would be the MOST suitable?
Question 1373
A systems engineer is designing a wide area network (WAN) environment for a new organization. The WAN will connect sites holding information at various levels of sensitivity, from publicly available to highly confidential. The organization requires a high degree of interconnectedness to support existing business processes. What is the BEST design approach to securing this environment?
Question 1374
Which event magnitude is defined as deadly, destructive, and disruptive when a hazard interacts with human vulnerability?
Question 1375
Which of the following goals represents a modern shift in risk management according to National Institute of Standards and Technology (NIST)?
Question 1376
A web developer is completing a new web application security checklist before releasing the application to production. the task of disabling unecessary services is on the checklist. Which web application threat is being mitigated by this action?
Question 1377
Which of the following is a limitation of the Bell-LaPadula model?
Question 1378
Which of the following is the BEST option to reduce the network attack surface of a system?
Question 1379
Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?
Question 1380
A financial organization that works according to agile principles has developed a new application for their external customer base to request a line of credit. A security analyst has been asked to assess the security risk of the minimum viable product (MVP). Which is the MOST important activity the analyst should assess?
Question