ISC CISSP Practice Test - Questions Answers, Page 50
List of questions
Question 491

Which of the following sets of controls should allow an investigation if an attack is not blocked by preventive controls or detected by monitoring?
Question 492

Determining outage costs caused by a disaster can BEST be measured by the
Question 493

Which of the following is considered a secure coding practice?
Question 494

As part of the security assessment plan, the security professional has been asked to use a negative testing strategy on a new website. Which of the following actions would be performed?
Question 495

Who has the PRIMARY responsibility to ensure that security objectives are aligned with organization goals?
Question 496

Which of the following alarm systems is recommended to detect intrusions through windows in a high-noise, occupied environment?
Question 497

Which of the following is the MOST effective practice in managing user accounts when an employee is terminated?
Question 498

Which of the following is the MOST important part of an awareness and training plan to prepare employees for emergency situations?
Question 499

What is the process of removing sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique?
Question 500

The security accreditation task of the System Development Life Cycle (SDLC) process is completed at the end of which phase?
Question