ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 139

List of questions

Question 1381

Report Export Collapse

When configuring Extensible Authentication Protocol (EAP) in a Voice over Internet Protocol (VoIP) network, which of the following authentication types is the MOST secure?

Become a Premium Member for full access
  Unlock Premium Member

Question 1382

Report Export Collapse

An organization would like to ensure that all new users have a predefined departmental access template applied upon creation. The organization would also like additional access for users to be granted on a per-project basis. What type of user access administration is BEST suited to meet the organization's needs?

Become a Premium Member for full access
  Unlock Premium Member

Question 1383

Report Export Collapse

A firm within the defense industry has been directed to comply with contractual requirements for encryption of a government client's Controlled Unclassified Information (CUI). What encryption strategy represents how to protect data at rest in the MOST efficient and cost-effective manner?

Become a Premium Member for full access
  Unlock Premium Member

Question 1384

Report Export Collapse

A software developer installs a game on their organization-provided smartphone. Upon installing the game, the software developer is prompted to allow the game access to call logs, Short Message Service (SMS) messaging, and Global

Positioning System (GPS) location dat a. What has the game MOST likely introduced to the smartphone?

Become a Premium Member for full access
  Unlock Premium Member

Question 1385

Report Export Collapse

A developer is creating an application that requires secure logging of all user activity. What is the BEST permission the developer should assign to the log file to ensure requirements are met?

Become a Premium Member for full access
  Unlock Premium Member

Question 1386

Report Export Collapse

What industry-recognized document could be used as a baseline reference that is related to data security and business operations for conducting a security assessment?

Become a Premium Member for full access
  Unlock Premium Member

Question 1387

Report Export Collapse

A scan report returned multiple vulnerabilities affecting several production servers that are mission critical. Attempts to apply the patches in the development environment have caused the servers to crash. What is the BEST course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 1388

Report Export Collapse

Which of the following would be the BEST guideline to follow when attempting to avoid the exposure of sensitive data?

Become a Premium Member for full access
  Unlock Premium Member

Question 1389

Report Export Collapse

Which application type is considered high risk and provides a common way for malware and viruses to enter a network?

Become a Premium Member for full access
  Unlock Premium Member

Question 1390

Report Export Collapse

In a disaster recovery (DR) test, which of the following would be a trait of crisis management?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search