ISC CISSP Practice Test - Questions Answers, Page 138
List of questions
Related questions
Which is MOST important when negotiating an Internet service provider (ISP) service-level agreement (SLA) by an organization that solely provides Voice over Internet Protocol (VoIP) services?
A company developed a web application which is sold as a Software as a Service (SaaS) solution to the customer. The application is hosted by a web server running on a 'specific operating system (OS) on a virtual machine (VM). During the transition phase of the service, it is determined that the support team will need access to the application logs. Which of the following privileges would be the MOST suitable?
A systems engineer is designing a wide area network (WAN) environment for a new organization. The WAN will connect sites holding information at various levels of sensitivity, from publicly available to highly confidential. The organization requires a high degree of interconnectedness to support existing business processes. What is the BEST design approach to securing this environment?
Which event magnitude is defined as deadly, destructive, and disruptive when a hazard interacts with human vulnerability?
Which of the following goals represents a modern shift in risk management according to National Institute of Standards and Technology (NIST)?
A web developer is completing a new web application security checklist before releasing the application to production. the task of disabling unecessary services is on the checklist. Which web application threat is being mitigated by this action?
Which of the following is a limitation of the Bell-LaPadula model?
Which of the following is the BEST option to reduce the network attack surface of a system?
Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?
A financial organization that works according to agile principles has developed a new application for their external customer base to request a line of credit. A security analyst has been asked to assess the security risk of the minimum viable product (MVP). Which is the MOST important activity the analyst should assess?
Question