ISC CISSP Practice Test - Questions Answers, Page 32
List of questions
Related questions
Which of the following is the MOST likely cause of a non-malicious data breach when the source of the data breach was an un-marked file cabinet containing sensitive documents?
A security professional has been asked to evaluate the options for the location of a new data center within a multifloor building. Concerns for the data center include emanations and physical access controls.
Which of the following is the BEST location?
Which of the following is the PRIMARY concern when using an Internet browser to access a cloudbased service?
After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway.
The perpetrator guessed a username and brute forced the password to gain access. Which of the following BEST mitigates this issue?
For an organization considering two-factor authentication for secure network access, which of the following is MOST secure?
If an identification process using a biometric system detects a 100% match between a presented template and a stored template, what is the interpretation of this result?
Regarding asset security and appropriate retention, which of the following INITIAL top three areas are important to focus on?
Discretionary Access Control (DAC) is based on which of the following?
By carefully aligning the pins in the lock, which of the following defines the opening of a mechanical lock without the proper key?
An organization has decided to contract with a cloud-based service provider to leverage their identity as a service offering. They will use Open Authentication (OAuth) 2.0 to authenticate external users to the organization's services.
As part of the authentication process, which of the following must the end user provide?
Question