ISC CISSP Practice Test - Questions Answers, Page 19
List of questions
Question 181

Which of the following BEST represents the principle of open design?
Question 182

The BEST way to check for good security programming practices, as well as auditing for possible backdoors, is to conduct
Question 183

An auditor carrying out a compliance audit requests passwords that are encrypted in the system to verify that the passwords are compliant with policy. Which of the following is the BEST response to the auditor?
Question 184

When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include
Question 185

An organization allows ping traffic into and out of their network. An attacker has installed a program on the network that uses the payload portion of the ping packet to move data into and out of the network. What type of attack has the organization experienced?
Question 186

Which of the following can BEST prevent security flaws occurring in outsourced software development?
Question 187

Which of the following is the MAIN reason that system re-certification and re-accreditation are needed?
Question 188

An external attacker has compromised an organization's network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker's ability to gain further information?
Question 189

A security consultant has been asked to research an organization's legal obligations to protect privacy-related information. What kind of reading material is MOST relevant to this project?
Question 190

According to best practice, which of the following groups is the MOST effective in performing an information security compliance audit?
Question