ISC CISSP Practice Test - Questions Answers, Page 6
List of questions
Related questions
Question 51
When is a Business Continuity Plan (BCP) considered to be valid?
Question 52
Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?
Question 53
Which of the following is the FIRST step in the incident response process?
Question 54
A continuous information security monitoring program can BEST reduce risk through which of the following?
Question 55
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization's systems cannot be unavailable for more than 24 hours?
Question 56
A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected. What is the MOST probable security feature of Java preventing the program from operating as intended?
Question 57
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?
Question 58
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
Question 59
Which of the following is the BEST method to prevent malware from being introduced into a production environment?
Question 60
The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)?
Explanation:
Reference https://online.concordiA.edu/computer-science/system-development-life-cycle-phases/
Question