ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 70

Add to Whishlist

List of questions

Question 691

Report Export Collapse

Which of the following MOST applies to session initiation protocal (SIP) security?

Become a Premium Member for full access
  Unlock Premium Member

Question 692

Report Export Collapse

Which layer of the Open systems Interconnection (OSI) model is being targeted in the event of a Synchronization (SYN) flood attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 693

Report Export Collapse

What is the document that describes the measures that have been implemented or planned to correct any deficiencies noted during the assessment of the security controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 694

Report Export Collapse

When dealing with shared, privilaged accounts, especially those for emergencies, what is the BEST way to assure non-repudiation of logs?

Become a Premium Member for full access
  Unlock Premium Member

Question 695

Report Export Collapse

Which of the following actions MUST be performed when using secure multipurpose internet mail Extension (S/MIME) before sending an encrypted message to a recipient?

Become a Premium Member for full access
  Unlock Premium Member

Question 696

Report Export Collapse

Which type of test suite should be run for fast feedback during application develoment?

Become a Premium Member for full access
  Unlock Premium Member

Question 697

Report Export Collapse

What are the roles within a scrum methodoligy?

Become a Premium Member for full access
  Unlock Premium Member

Question 698

Report Export Collapse

What is the FIRST step required in establishing a records retention program?

Become a Premium Member for full access
  Unlock Premium Member

Question 699

Report Export Collapse

Which of the following was developed to support multiple protocols as well as provide as well as provide login, password, and error correction capabilities?

Become a Premium Member for full access
  Unlock Premium Member

Question 700

Report Export Collapse

An organization discovers that its secure file transfer protocol (SFTP) server has been accessed by an unauthorized person to download an unreleased game. A recent security audit found weaknesses in some of the organization's general information technology (IT) controls, specifically pertaining to software change control and security patch management, but not in other control areas.

Which of the following is the MOST probable attack vector used in the security breach?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149