ISC CISSP Practice Test - Questions Answers, Page 54
List of questions
Question 531

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover.
Which access control mechanism would be preferred?
Question 532

Which of the following management process allows ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?
Question 533

Which security access policy contains fixed security attributes that are used by the system to determine a user's access to a file or object?
Question 534

Which of the following is a common characteristic of privacy?
Question 535

At a MINIMUM, audits of permissions to individual or group accounts should be scheduled
Question 536

Which of the following is part of a Trusted Platform Module (TPM)?
Question 537

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?
Question 538

Which of the following combinations would MOST negatively affect availability?
Question 539

Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?
Question 540

A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results.
What should be implemented to BEST achieve the desired results?
Question