ISC CISSP Practice Test - Questions Answers, Page 140
List of questions
Related questions
Question 1391
The existence of physical barriers, card and personal identification number (PIN) access systems, cameras, alarms, and security guards BEST describes this security approach?
Question 1392
A software architect has been asked to build a platform to distribute music to thousands of users on a global scale. The architect has been reading about content delivery networks (CDN). Which of the following is a principal task to undertake?
Question 1393
Which of the following BEST describes centralized identity management?
Question 1394
A database server for a financial application is scheduled for production deployment. Which of the following controls will BEST prevent tampering?
Question 1395
What is the FIRST step that should be considered in a Data Loss Prevention (DLP) program?
Question 1396
What is the benefit of an operating system (OS) feature that is designed to prevent an application from executing code from a non-executable memory region?
Question 1397
What Hypertext Transfer Protocol (HTTP) response header can be used to disable the execution ofinline JavaScript and the execution of eval()-type functions?
Question 1398
Which section of the assessment report addresses separate vulnerabilities, weaknesses, and gaps?
Question 1399
In a quarterly system access review, an active privileged account was discovered that did not exist in the prior review on the production system. The account was created one hour after the previous access review. Which of the following is the BEST option to reduce overall risk in addition to quarterly access reviews?
Question 1400
When recovering from an outage, what is the Recovery Point Objective (RPO), in terms of data recovery?
Question