ISC CISSP Practice Test - Questions Answers, Page 25
List of questions
Question 241

Without proper signal protection, embedded systems may be prone to which type of attack?
Question 242

Which of the following is a detective access control mechanism?
Question 243

Which of the following BEST describes Recovery Time Objective (RTO)?
Question 244

An organization publishes and periodically updates its employee policies in a file on their intranet.
Which of the following is a PRIMARY security concern?
Question 245

An online retail company has formulated a record retention schedule for customer transactions.
Which of the following is a valid reason a customer transaction is kept beyond the retention schedule?
Question 246

Which of the following is the MAIN goal of a data retention policy?
Question 247

Which of the following problems is not addressed by using OAuth (Open Standard to Authorization) 2.0 to integrate a third-party identity provider for a service?
Question 248

The use of proximity card to gain access to a building is an example of what type of security control?
Question 249

Multi-Factor Authentication (MFA) is necessary in many systems given common types of password attacks. Which of the following is a correct list of password attacks?
Question 250

Which of the following is an example of two-factor authentication?
Question