ISC CISSP Practice Test - Questions Answers, Page 29
List of questions
Question 281
Refer to the information below to answer the question.
A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party provider's facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based applications used by the organization.
The third party needs to have
Question 282
Refer to the information below to answer the question.
A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party provider's facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based applications used by the organization.
The organization should ensure that the third party's physical security controls are in place so that they
Question 283
Refer to the information below to answer the question.
A large, multinational organization has decided to outsource a portion of their Information Technology (IT) organization to a third-party provider's facility. This provider will be responsible for the design, development, testing, and support of several critical, customer-based applications used by the organization.
What additional considerations are there if the third party is located in a different country?
Question 284
What is the MOST critical factor to achieve the goals of a security program?
Question 285
A business has implemented Payment Card Industry Data Security Standard (PCI-DSS) compliant handheld credit card processing on their Wireless Local Area Network (WLAN) topology. The network team partitioned the WLAN to create a private segment for credit card processing using a firewall to control device access and route traffic to the card processor on the Internet. What components are in the scope of PCI-DSS?
Question 286
During an audit, the auditor finds evidence of potentially illegal activity. Which of the following is the MOST appropriate action to take?
Question 287
Which of the following secure startup mechanisms are PRIMARILY designed to thwart attacks?
Question 288
What is the BEST first step for determining if the appropriate security controls are in place for protecting data at rest?
Question 289
Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen?
Question 290
Which of the following is a process within a Systems Engineering Life Cycle (SELC) stage?
Question