ISC CISSP Practice Test - Questions Answers, Page 39
Related questions
Question 381
Which of the following is the MOST effective method of mitigating data theft from an active user workstation?
Question 382
The BEST method to mitigate the risk of a dictionary attack on a system is to
Question 383
Which of the following is an advantage of on-premise Credential Management Systems?
Question 384
Which of the following prevents improper aggregation of privileges in Role Based Access Control (RBAC)?
Question 385
The implementation of which features of an identity management system reduces costs and administration overhead while improving audit and accountability?
Question 386
Which of the following is the BEST method to assess the effectiveness of an organization's vulnerability management program?
Question 387
Which methodology is recommended for penetration testing to be effective in the development phase of the life-cycle process?
Question 388
Which of the following is most helpful in applying the principle of LEAST privilege?
Question 389
Which of the following explains why record destruction requirements are included in a data retention policy?
Question 390
What should happen when an emergency change to a system must be performed?
Question