ISC CISSP Practice Test - Questions Answers, Page 73

List of questions
Question 721

Which of the following controls is the most for a system identified as critical in terms of data and function to the organization?
Question 722

An organization operates a legacy Industrial Control System (ICS) to support its core business service, which carrot be replaced. Its management MUST be performed remotely through an administrative console software, which in tum depends on an old version of the Java Runtime Environment (JPE) known to be vulnerable to a number of attacks, How is this risk BEST managed?
Question 723

Which of the following steps is performed during the forensic data analysis phase?
Question 724

Which of the following practices provides the development of security and identification of threats in designing software?
Question 725

Which of the following presents the PRIMARY concern to an organization when setting up a federated single sign-on (SSO) solution with another
Question 726

The adoption of an enterprise-wide business continuity program requires Which of the following?
Question 727

Which of the following is the MOST important reason for using a chain of custody from?
Question 728

When conducting a security assessment of access controls , Which activity is port of the data analysis phase?
Question 729

The core component of Role Based Access control (RBAC) must be constructed of defined data elements. Which elements are required?
Question 730

Which of the following should be included in a hardware retention policy?
Which of the following should be included in a hardware retention policy?
Question