ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 36

Add to Whishlist

List of questions

Question 351

Report Export Collapse

While investigating a malicious event, only six days of audit logs from the last month were available.

What policy should be updated to address this problem?

Become a Premium Member for full access
  Unlock Premium Member

Question 352

Report Export Collapse

Who is ultimately responsible to ensure that information assets are categorized and adequate measures are taken to protect them?

Become a Premium Member for full access
  Unlock Premium Member

Question 353

Report Export Collapse

A mobile device application that restricts the storage of user information to just that which is needed to accomplish lawful business goals adheres to what privacy principle?

Become a Premium Member for full access
  Unlock Premium Member

Question 354

Report Export Collapse

Which of the following is the PRIMARY benefit of implementing data-in-use controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 355

Report Export Collapse

A health care provider is considering Internet access for their employees and patients. Which of the following is the organization's MOST secure solution for protection of data?

Become a Premium Member for full access
  Unlock Premium Member

Question 356

Report Export Collapse

Which of the following BEST describes the purpose of the security functional requirements of Common Criteria?

Become a Premium Member for full access
  Unlock Premium Member

Question 357

Report Export Collapse

Application of which of the following Institute of Electrical and Electronics Engineers (IEEE) standards will prevent an unauthorized wireless device from being attached to a network?

Become a Premium Member for full access
  Unlock Premium Member

Question 358

Report Export Collapse

The PRIMARY security concern for handheld devices is the

Become a Premium Member for full access
  Unlock Premium Member

Question 359

Report Export Collapse

Which of the following is the BIGGEST weakness when using native Lightweight Directory Access Protocol (LDAP) for authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 360

Report Export Collapse

A global organization wants to implement hardware tokens as part of a multifactor authentication solution for remote access. The PRIMARY advantage of this implementation is

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search