ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 51

Add to Whishlist

List of questions

Question 501

Report Export Collapse

Which of the following is the BEST reason for the use of security metrics?

Become a Premium Member for full access
  Unlock Premium Member

Question 502

Report Export Collapse

Which of the following is a benefit in implementing an enterprise Identity and Access Management (IAM) solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 503

Report Export Collapse

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 504

Report Export Collapse

Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

Become a Premium Member for full access
  Unlock Premium Member

Question 505

Report Export Collapse

Which of the following mandates the amount and complexity of security controls applied to a security risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 506

Report Export Collapse

When determining who can accept the risk associated with a vulnerability, which of the following is MOST important?

Become a Premium Member for full access
  Unlock Premium Member

Question 507

Report Export Collapse

A security professional determines that a number of outsourcing contracts inherited from a previous merger do not adhere to the current security requirements. Which of the following BEST minimizes the risk of this happening again?

Become a Premium Member for full access
  Unlock Premium Member

Question 508

Report Export Collapse

Which of the following is a direct monetary cost of a security incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 509

Report Export Collapse

Which of the following would MINIMIZE the ability of an attacker to exploit a buffer overflow?

Become a Premium Member for full access
  Unlock Premium Member

Question 510

Report Export Collapse

Which of the following mechanisms will BEST prevent a Cross-Site Request Forgery (CSRF) attack?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149