ISC CISSP Practice Test - Questions Answers, Page 7
List of questions
Question 61

What is the BEST approach to addressing security issues in legacy web applications?
Question 62

Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?
Question 63

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?
Question 64

Which of the following elements MUST a compliant EU-US Safe Harbor Privacy Policy contain?
Question 65

What is the MOST effective countermeasure to a malicious code attack against a mobile system?
Question 66

Which of the following is the BEST mitigation from phishing attacks?
Question 67

Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming?
Question 68

Which of the following is an essential element of a privileged identity lifecycle management?
Question 69

Which of the following is ensured when hashing files during chain of custody handling?
Question 70

Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?
Question