ISC CISSP Practice Test - Questions Answers, Page 39
List of questions
Question 381

Which of the following is the MOST effective method of mitigating data theft from an active user workstation?
Question 382

The BEST method to mitigate the risk of a dictionary attack on a system is to
Question 383

Which of the following is an advantage of on-premise Credential Management Systems?
Question 384

Which of the following prevents improper aggregation of privileges in Role Based Access Control (RBAC)?
Question 385

The implementation of which features of an identity management system reduces costs and administration overhead while improving audit and accountability?
Question 386

Which of the following is the BEST method to assess the effectiveness of an organization's vulnerability management program?
Question 387

Which methodology is recommended for penetration testing to be effective in the development phase of the life-cycle process?
Question 388

Which of the following is most helpful in applying the principle of LEAST privilege?
Question 389

Which of the following explains why record destruction requirements are included in a data retention policy?
Question 390

What should happen when an emergency change to a system must be performed?
Question