ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 144

Question list
Search
Search

List of questions

Search

Question 1431

Report
Export
Collapse

Which of the following should be included in a good defense-in-depth strategy provided by objectoriented programming for software deployment?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1432

Report
Export
Collapse

Which of the following documents specifies services from the client's viewpoint?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1433

Report
Export
Collapse

An organization is planning to have an it audit of its as a Service (SaaS) application to demonstrate to external parties that the security controls around availability are designed. The audit report must also cover a certain period of time to show the operational effectiveness of the controls. Which Service Organization Control (SOC) report would BEST fit their needs?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1434

Report
Export
Collapse

Which Open Systems Interconnection (OSI) layer(s) BEST corresponds to the network access layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1435

Report
Export
Collapse

An organization is considering partnering with a third-party supplier of cloud services. The organization will only be providing the data and the third-party supplier will be providing the security controls. Which of the following BEST describes this service offering?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1436

Report
Export
Collapse

Which security audit standard provides the BEST way for an organization to understand a vendor's Information Systems (IS) in relation to confidentiality, integrity, and availability?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1437

Report
Export
Collapse

Which of the following is the MOST appropriate technique for destroying magnetic platter style hard disk drives (HDD) containing data with a "HIGH" security categorization?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1438

Report
Export
Collapse

employee training, risk management, and data handling procedures and policies could be characterized as which type of security measure?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1439

Report
Export
Collapse

The Chief Information Security Officer (CISO) of an organization has requested that a Service Organization Control (SOC) report be created to outline the security and availability of a particular system over a 12-month period. Which type of SOC report should be utilized?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 1440

Report
Export
Collapse

A security practitioner needs to implementation solution to verify endpoint security protections and operating system (0S) versions. Which of the following is the BEST solution to implement?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 1.482 questions
Go to page: of 149