ISC CISSP Practice Test - Questions Answers, Page 60
List of questions
Related questions
Question 591
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Who is accountable for the information within an Information System (IS)?
Question 592
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
It is MOST important to perform which of the following to minimize potential impact when implementing a new vulnerability scanning tool in a production environment?
Question 593
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A Security Operations Center (SOC) receives an incident response notification on a server with an active intruder who has planted a backdoor. Initial notifications are sent and communications are established.
What MUST be considered or evaluated before performing the next step?
Question 594
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Due to system constraints, a group of system administrators must share a high-level access set of credentials.
Which of the following would be MOST appropriate to implement?
Question 595
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following is the MOST efficient mechanism to account for all staff during a speedy nonemergency evacuation from a large security facility?
Question 596
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What does electronic vaulting accomplish?
Question 597
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Who would be the BEST person to approve an organizations information security policy?
Question 598
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A security analyst for a large financial institution is reviewing network traffic related to an incident.
The analyst determines the traffic is irrelevant to the investigation but in the process of the review, the analyst also finds that an applications data, which included full credit card cardholder data, is transferred in clear text between the server and user's desktop. The analyst knows this violates the Payment Card Industry Data Security Standard (PCI-DSS). Which of the following is the analyst's next step?
Question 599
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
An Information Technology (IT) professional attends a cybersecurity seminar on current incident response methodologies.
What code of ethics canon is being observed?
Question 600
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
An organization adopts a new firewall hardening standard. How can the security professional verify that the technical staff correct implemented the new standard?
Question