ISC CISSP Practice Test - Questions Answers, Page 25
List of questions
Related questions
Question 241
Without proper signal protection, embedded systems may be prone to which type of attack?
Question 242
Which of the following is a detective access control mechanism?
Question 243
Which of the following BEST describes Recovery Time Objective (RTO)?
Question 244
An organization publishes and periodically updates its employee policies in a file on their intranet.
Which of the following is a PRIMARY security concern?
Question 245
An online retail company has formulated a record retention schedule for customer transactions.
Which of the following is a valid reason a customer transaction is kept beyond the retention schedule?
Question 246
Which of the following is the MAIN goal of a data retention policy?
Question 247
Which of the following problems is not addressed by using OAuth (Open Standard to Authorization) 2.0 to integrate a third-party identity provider for a service?
Question 248
The use of proximity card to gain access to a building is an example of what type of security control?
Question 249
Multi-Factor Authentication (MFA) is necessary in many systems given common types of password attacks. Which of the following is a correct list of password attacks?
Question 250
Which of the following is an example of two-factor authentication?
Question