ISC CISSP Practice Test - Questions Answers, Page 19
List of questions
Question 181
Which of the following BEST represents the principle of open design?
Question 182
The BEST way to check for good security programming practices, as well as auditing for possible backdoors, is to conduct
Question 183
An auditor carrying out a compliance audit requests passwords that are encrypted in the system to verify that the passwords are compliant with policy. Which of the following is the BEST response to the auditor?
Question 184
When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include
Question 185
An organization allows ping traffic into and out of their network. An attacker has installed a program on the network that uses the payload portion of the ping packet to move data into and out of the network. What type of attack has the organization experienced?
Question 186
Which of the following can BEST prevent security flaws occurring in outsourced software development?
Question 187
Which of the following is the MAIN reason that system re-certification and re-accreditation are needed?
Question 188
An external attacker has compromised an organization's network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker's ability to gain further information?
Question 189
A security consultant has been asked to research an organization's legal obligations to protect privacy-related information. What kind of reading material is MOST relevant to this project?
Question 190
According to best practice, which of the following groups is the MOST effective in performing an information security compliance audit?
Question