ISC CISSP Practice Test - Questions Answers, Page 4
List of questions
Related questions
Question 31
An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?
Question 32
Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?
Question 33
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Question 34
A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization?
Question 35
Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?
Question 36
Users require access rights that allow them to view the average salary of groups of employees.
Which control would prevent the users from obtaining an individual employee's salary?
Question 37
What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
Question 38
Which of the following is of GREATEST assistance to auditors when reviewing system configurations?
Question 39
In which of the following programs is it MOST important to include the collection of security process data?
Question 40
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user's access to data files?
Question