ISC CISSP Practice Test - Questions Answers, Page 19
List of questions
Related questions
Which of the following BEST represents the principle of open design?
The BEST way to check for good security programming practices, as well as auditing for possible backdoors, is to conduct
An auditor carrying out a compliance audit requests passwords that are encrypted in the system to verify that the passwords are compliant with policy. Which of the following is the BEST response to the auditor?
When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include
An organization allows ping traffic into and out of their network. An attacker has installed a program on the network that uses the payload portion of the ping packet to move data into and out of the network. What type of attack has the organization experienced?
Which of the following can BEST prevent security flaws occurring in outsourced software development?
Which of the following is the MAIN reason that system re-certification and re-accreditation are needed?
An external attacker has compromised an organization's network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker's ability to gain further information?
A security consultant has been asked to research an organization's legal obligations to protect privacy-related information. What kind of reading material is MOST relevant to this project?
According to best practice, which of the following groups is the MOST effective in performing an information security compliance audit?
Question