ISC CISSP Practice Test - Questions Answers, Page 140
List of questions
Related questions
The existence of physical barriers, card and personal identification number (PIN) access systems, cameras, alarms, and security guards BEST describes this security approach?
A software architect has been asked to build a platform to distribute music to thousands of users on a global scale. The architect has been reading about content delivery networks (CDN). Which of the following is a principal task to undertake?
Which of the following BEST describes centralized identity management?
A database server for a financial application is scheduled for production deployment. Which of the following controls will BEST prevent tampering?
What is the FIRST step that should be considered in a Data Loss Prevention (DLP) program?
What is the benefit of an operating system (OS) feature that is designed to prevent an application from executing code from a non-executable memory region?
What Hypertext Transfer Protocol (HTTP) response header can be used to disable the execution ofinline JavaScript and the execution of eval()-type functions?
Which section of the assessment report addresses separate vulnerabilities, weaknesses, and gaps?
In a quarterly system access review, an active privileged account was discovered that did not exist in the prior review on the production system. The account was created one hour after the previous access review. Which of the following is the BEST option to reduce overall risk in addition to quarterly access reviews?
When recovering from an outage, what is the Recovery Point Objective (RPO), in terms of data recovery?
Question