ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 61

List of questions

Question 601

Report Export Collapse

What is the MAIN purpose of a change management policy?

To assure management that changes to the Information Technology (IT) infrastructure are necessary
To assure management that changes to the Information Technology (IT) infrastructure are necessary
To identify the changes that may be made to the Information Technology (IT) infrastructure
To identify the changes that may be made to the Information Technology (IT) infrastructure
To verify that changes to the Information Technology (IT) infrastructure are approved
To verify that changes to the Information Technology (IT) infrastructure are approved
To determine the necessary for implementing modifications to the Information Technology (IT) infrastructure
To determine the necessary for implementing modifications to the Information Technology (IT) infrastructure
Suggested answer: C
asked 18/09/2024
Eduardo Rives
43 questions

Question 602

Report Export Collapse

Who is responsible for the protection of information when it is shared with or provided to other organizations?

Systems owner
Systems owner
Authorizing Official (AO)
Authorizing Official (AO)
Information owner
Information owner
Security officer
Security officer
Suggested answer: C
asked 18/09/2024
Tiziano Riezzo
55 questions

Question 603

Report Export Collapse

Which of the following is the MOST challenging issue in apprehending cyber criminals?

They often use sophisticated method to commit a crime.
They often use sophisticated method to commit a crime.
It is often hard to collect and maintain integrity of digital evidence.
It is often hard to collect and maintain integrity of digital evidence.
The crime is often committed from a different jurisdiction.
The crime is often committed from a different jurisdiction.
There is often no physical evidence involved.
There is often no physical evidence involved.
Suggested answer: C
asked 18/09/2024
George Sanchez
43 questions

Question 604

Report Export Collapse

Which of the following are important criteria when designing procedures and acceptance criteria for acquired software?

Code quality, security, and origin
Code quality, security, and origin
Architecture, hardware, and firmware
Architecture, hardware, and firmware
Data quality, provenance, and scaling
Data quality, provenance, and scaling
Distributed, agile, and bench testing
Distributed, agile, and bench testing
Suggested answer: A
asked 18/09/2024
Jorrit Meijer
50 questions

Question 605

Report Export Collapse

Which of the following steps should be performed FIRST when purchasing Commercial Off-The-Shelf (COTS) software?

undergo a security assessment as part of authorization process
undergo a security assessment as part of authorization process
establish a risk management strategy
establish a risk management strategy
harden the hosting server, and perform hosting and application vulnerability scans
harden the hosting server, and perform hosting and application vulnerability scans
establish policies and procedures on system and services acquisition
establish policies and procedures on system and services acquisition
Suggested answer: D
asked 18/09/2024
Narender B
38 questions

Question 606

Report Export Collapse

An organization has outsourced its financial transaction processing to a Cloud Service Provider (CSP) who will provide them with Software as a Service (SaaS). If there was a data breach who is responsible for monetary losses?

The Data Protection Authority (DPA)
The Data Protection Authority (DPA)
The Cloud Service Provider (CSP)
The Cloud Service Provider (CSP)
The application developers
The application developers
The data owner
The data owner
Suggested answer: B
asked 18/09/2024
Ben Johnson
40 questions

Question 607

Report Export Collapse

What is the PRIMARY role of a scrum master in agile development?

To choose the primary development language
To choose the primary development language
To choose the integrated development environment
To choose the integrated development environment
To match the software requirements to the delivery plan
To match the software requirements to the delivery plan
To project manage the software delivery
To project manage the software delivery
Suggested answer: D
asked 18/09/2024
Frantisek Kohanyi Kohanyi
44 questions

Question 608

Report Export Collapse

What capability would typically be included in a commercially available software package designed for access control?

Password encryption
Password encryption
File encryption
File encryption
Source library control
Source library control
File authentication
File authentication
Suggested answer: A
asked 18/09/2024
Aviv Beck
45 questions

Question 609

Report Export Collapse

An organization plan on purchasing a custom software product developed by a small vendor to support its business model. Which unique consideration should be made part of the contractual agreement potential long-term risks associated with creating this dependency?

A source code escrow clause
A source code escrow clause
Right to request an independent review of the software source code
Right to request an independent review of the software source code
Due diligence form requesting statements of compliance with security requirements
Due diligence form requesting statements of compliance with security requirements
Access to the technical documentation
Access to the technical documentation
Suggested answer: B
asked 18/09/2024
Bright Ngobeni
49 questions

Question 610

Report Export Collapse

When developing solutions for mobile devices, in which phase of the Software Development Life Cycle (SDLC) should technical limitations related to devices be specified?

Implementation
Implementation
Initiation
Initiation
Review
Review
Development
Development
Suggested answer: A
asked 18/09/2024
Gurdeep Girn
38 questions
Total 1.482 questions
Go to page: of 149