ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 54

Add to Whishlist

List of questions

Question 531

Report Export Collapse

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover.

Which access control mechanism would be preferred?

Become a Premium Member for full access
  Unlock Premium Member

Question 532

Report Export Collapse

Which of the following management process allows ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?

Become a Premium Member for full access
  Unlock Premium Member

Question 533

Report Export Collapse

Which security access policy contains fixed security attributes that are used by the system to determine a user's access to a file or object?

Become a Premium Member for full access
  Unlock Premium Member

Question 534

Report Export Collapse

Which of the following is a common characteristic of privacy?

Become a Premium Member for full access
  Unlock Premium Member

Question 535

Report Export Collapse

At a MINIMUM, audits of permissions to individual or group accounts should be scheduled

Become a Premium Member for full access
  Unlock Premium Member

Question 536

Report Export Collapse

Which of the following is part of a Trusted Platform Module (TPM)?

Become a Premium Member for full access
  Unlock Premium Member

Question 537

Report Export Collapse

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?

Become a Premium Member for full access
  Unlock Premium Member

Question 538

Report Export Collapse

Which of the following combinations would MOST negatively affect availability?

Become a Premium Member for full access
  Unlock Premium Member

Question 539

Report Export Collapse

Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?

Become a Premium Member for full access
  Unlock Premium Member

Question 540

Report Export Collapse

A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results.

What should be implemented to BEST achieve the desired results?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search