ISC CISSP Practice Test - Questions Answers, Page 139
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 1381
 
                            
                            
                                When configuring Extensible Authentication Protocol (EAP) in a Voice over Internet Protocol (VoIP) network, which of the following authentication types is the MOST secure?
Question 1382
 
                            
                            
                                An organization would like to ensure that all new users have a predefined departmental access template applied upon creation. The organization would also like additional access for users to be granted on a per-project basis. What type of user access administration is BEST suited to meet the organization's needs?
Question 1383
 
                            
                            
                                A firm within the defense industry has been directed to comply with contractual requirements for encryption of a government client's Controlled Unclassified Information (CUI). What encryption strategy represents how to protect data at rest in the MOST efficient and cost-effective manner?
Question 1384
 
                            
                            
                                A software developer installs a game on their organization-provided smartphone. Upon installing the game, the software developer is prompted to allow the game access to call logs, Short Message Service (SMS) messaging, and Global
Positioning System (GPS) location dat a. What has the game MOST likely introduced to the smartphone?
Question 1385
 
                            
                            
                                A developer is creating an application that requires secure logging of all user activity. What is the BEST permission the developer should assign to the log file to ensure requirements are met?
Question 1386
 
                            
                            
                                What industry-recognized document could be used as a baseline reference that is related to data security and business operations for conducting a security assessment?
Question 1387
 
                            
                            
                                A scan report returned multiple vulnerabilities affecting several production servers that are mission critical. Attempts to apply the patches in the development environment have caused the servers to crash. What is the BEST course of action?
Question 1388
 
                            
                            
                                Which of the following would be the BEST guideline to follow when attempting to avoid the exposure of sensitive data?
Question 1389
 
                            
                            
                                Which application type is considered high risk and provides a common way for malware and viruses to enter a network?
Question 1390
 
                            
                            
                                In a disaster recovery (DR) test, which of the following would be a trait of crisis management?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question