ISC CISSP Practice Test - Questions Answers, Page 54
List of questions
Related questions
The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover.
Which access control mechanism would be preferred?
Which of the following management process allows ONLY those services required for users to accomplish their tasks, change default user passwords, and set servers to retrieve antivirus updates?
Which security access policy contains fixed security attributes that are used by the system to determine a user's access to a file or object?
Which of the following is a common characteristic of privacy?
At a MINIMUM, audits of permissions to individual or group accounts should be scheduled
Which of the following is part of a Trusted Platform Module (TPM)?
In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?
Which of the following combinations would MOST negatively affect availability?
Which of the following could be considered the MOST significant security challenge when adopting DevOps practices compared to a more traditional control framework?
A security compliance manager of a large enterprise wants to reduce the time it takes to perform network, system, and application security compliance audits while increasing quality and effectiveness of the results.
What should be implemented to BEST achieve the desired results?
Question