ISC CISSP Practice Test - Questions Answers, Page 52
List of questions
Related questions
Question 511
Which factors MUST be considered when classifying information and supporting assets for risk management, legal discovery, and compliance?
Question 512
When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?
Question 513
Which of the following is the MOST appropriate action when reusing media that contains sensitive data?
Question 514
An organization recently conducted a review of the security of its network applications. One of the vulnerabilities found was that the session key used in encrypting sensitive information to a third party server had been hard-coded in the client and server applications. Which of the following would be MOST effective in mitigating this vulnerability?
Question 515
Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center?
Question 516
Unused space in a disk cluster is important in media analysis because it may contain which of the following?
Question 517
A company seizes a mobile device suspected of being used in committing fraud. What would be the BEST method used by a forensic examiner to isolate the powered-on device from the network and preserve the evidence?
Question 518
Which of the following is MOST appropriate for protecting confidentially of data stored on a hard drive?
Question 519
Which of the following is the MOST effective method to mitigate Cross-Site Scripting (XSS) attacks?
Question 520
What is the MOST significant benefit of an application upgrade that replaces randomly generated session keys with certificate based encryption for communications with backend servers?
Question