ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 63

Add to Whishlist

List of questions

Question 621

Report Export Collapse

Which of the following is the BEST way to reduce the impact of an externally sourced flood attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 622

Report Export Collapse

Which of the following is the BEST Identity-as-a-Service (IDaaS) solution for validating users?

Become a Premium Member for full access
  Unlock Premium Member

Question 623

Report Export Collapse

When conducting a security assessment of access controls, which activity is part of the data analysis phase?

Become a Premium Member for full access
  Unlock Premium Member

Question 624

Report Export Collapse

Which of the following is used to support the of defense in depth during development phase of a software product?

Become a Premium Member for full access
  Unlock Premium Member

Question 625

Report Export Collapse

When a system changes significantly, who is PRIMARILY responsible for assessing the security impact?

Become a Premium Member for full access
  Unlock Premium Member

Question 626

Report Export Collapse

When selecting a disk encryption technology, which of the following MUST also be assured to be encrypted?

Become a Premium Member for full access
  Unlock Premium Member

Question 627

Report Export Collapse

Which of the following attacks is dependent upon the compromise of a secondary target in order to reach the primary target?

Become a Premium Member for full access
  Unlock Premium Member

Question 628

Report Export Collapse

Additional padding may be added to toe Encapsulating Security Protocol (ESP) b trailer to provide which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 629

Report Export Collapse

Company A is evaluating new software to replace an in-house developed application. During the acquisition process. Company A specified the security retirement, as well as the functional requirements. Company B responded to the acquisition request with their flagship product that runs on an Operating System (OS) that Company A has never used nor evaluated. The flagship product meets all security -and functional requirements as defined by Company A.

Based upon Company B's response, what step should Company A take?

Become a Premium Member for full access
  Unlock Premium Member

Question 630

Report Export Collapse

What is maintained by using write blocking devices whan forensic evidence is examined?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149