ISC CISSP Practice Test - Questions Answers, Page 41
List of questions
Question 401

What is the PRIMARY goal for using Domain Name System Security Extensions (DNSSEC) to sign records?
Question 402

While inventorying storage equipment, it is found that there are unlabeled, disconnected, and powered off devices. Which of the following is the correct procedure for handling such equipment?
Question 403

The PRIMARY characteristic of a Distributed Denial of Service (DDoS) attack is that it
Question 404

Which of the following is generally indicative of a replay attack when dealing with biometric authentication?
Question 405

During a fingerprint verification process, which of the following is used to verify identity and authentication?
Question 406

The BEST example of the concept of "something that a user has" when providing an authorized user access to a computing system is
Question 407

A security professional is asked to provide a solution that restricts a bank teller to only perform a savings deposit transaction but allows a supervisor to perform corrections after the transaction.
Which of the following is the MOST effective solution?
Question 408

Sensitive customer data is going to be added to a database. What is the MOST effective implementation for ensuring data privacy?
Question 409

Which of the following types of security testing is the MOST effective in providing a better indication of the everyday security challenges of an organization when performing a security risk assessment?
Question 410

What is the MOST effective method of testing custom application code?
Question