ISC CISSP Practice Test - Questions Answers, Page 32
List of questions
Question 311

Which of the following is the MOST likely cause of a non-malicious data breach when the source of the data breach was an un-marked file cabinet containing sensitive documents?
Question 312

A security professional has been asked to evaluate the options for the location of a new data center within a multifloor building. Concerns for the data center include emanations and physical access controls.
Which of the following is the BEST location?
Question 313

Which of the following is the PRIMARY concern when using an Internet browser to access a cloudbased service?
Question 314

After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway.
The perpetrator guessed a username and brute forced the password to gain access. Which of the following BEST mitigates this issue?
Question 315

For an organization considering two-factor authentication for secure network access, which of the following is MOST secure?
Question 316

If an identification process using a biometric system detects a 100% match between a presented template and a stored template, what is the interpretation of this result?
Question 317

Regarding asset security and appropriate retention, which of the following INITIAL top three areas are important to focus on?
Question 318

Discretionary Access Control (DAC) is based on which of the following?
Question 319

By carefully aligning the pins in the lock, which of the following defines the opening of a mechanical lock without the proper key?
Question 320

An organization has decided to contract with a cloud-based service provider to leverage their identity as a service offering. They will use Open Authentication (OAuth) 2.0 to authenticate external users to the organization's services.
As part of the authentication process, which of the following must the end user provide?
Question