ISC CISSP Practice Test - Questions Answers, Page 147
List of questions
Related questions
Question 1461
Which of the following MUST the administrator of a security information and event management (SIEM) system ensure?
Question 1462
Which of the following terms BEST describes a system which allows a user to log in and access multiple related servers and applications?
Question 1463
After the INITIAL input o f a user identification (ID) and password, what is an authentication system that prompts the user for a different response each time the user logs on?
Question 1464
What is the P R IM A R Y reason criminal law is difficult to enforce when dealing with cyber-crime?
Question 1465
Which of the following are the B EST characteristics of security metrics?
Question 1466
At which phase of the software assurance life cycle should risks associated with software acquisition strategies be identified?
Question 1467
Which of the following would be considered an incident if reported by a security information and event management (SIEM) system?
Question 1468
a large organization uses biometrics to allow access to its facilities. It adjusts the biometric value for incorrectly granting or denying access so that the two numbers are the same.
What is this value called?
Question 1469
Spyware is BEST described as
Question 1470
If traveling abroad and a customs official demands to examine a personal computer, which of the following should be assumed?
Question