ISC CISSP Practice Test - Questions Answers, Page 20
List of questions
Related questions
Question 191
When is security personnel involvement in the Systems Development Life Cycle (SDLC) process MOST beneficial?
Question 192
A large bank deploys hardware tokens to all customers that use their online banking system. The token generates and displays a six digit numeric password every 60 seconds. The customers must log into their bank accounts using this numeric password. This is an example of
Question 193
Which of the following is the BEST reason to review audit logs periodically?
Question 194
What is the PRIMARY reason for ethics awareness and related policy implementation?
Question 195
Which of the following is critical for establishing an initial baseline for software components in the operation and maintenance of applications?
Question 196
Which of the following actions MUST be taken if a vulnerability is discovered during the maintenance stage in a System Development Life Cycle (SDLC)?
Question 197
Which of the following provides effective management assurance for a Wireless Local Area Network (WLAN)?
Question 198
From a security perspective, which of the following is a best practice to configure a Domain Name Service (DNS) system?
Question 199
Which of the following is the MOST beneficial to review when performing an IT audit?
Question 200
During an investigation of database theft from an organization's web site, it was determined that the Structured Query Language (SQL) injection technique was used despite input validation with clientside scripting. Which of the following provides the GREATEST protection against the same attack occurring again?
Question