ISC CISSP Practice Test - Questions Answers, Page 4
List of questions
Question 31

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?
Question 32

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?
Question 33

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Question 34

A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization?
Question 35

Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?
Question 36

Users require access rights that allow them to view the average salary of groups of employees.
Which control would prevent the users from obtaining an individual employee's salary?
Question 37

What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?
Question 38

Which of the following is of GREATEST assistance to auditors when reviewing system configurations?
Question 39

In which of the following programs is it MOST important to include the collection of security process data?
Question 40

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user's access to data files?
Question