ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 75

Add to Whishlist

List of questions

Question 741

Report Export Collapse

copyright provides protection for which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 742

Report Export Collapse

An organization is required to comply with the Payment Card Industry Data Security Standard (PCIDSS), what is the MOST effective approach to safeguard digital and paper media that contains cardholder data?

Become a Premium Member for full access
  Unlock Premium Member

Question 743

Report Export Collapse

A vehicle of a private courier company that transports backup data for offsite storage was robbed while in transport backup data for offsite was robbed while in transit. The incident management team is now responsible to estimate the robbery, which of the following would help the incident management team to MOST effectively analyze the business impact of the robbery?

Become a Premium Member for full access
  Unlock Premium Member

Question 744

Report Export Collapse

When should an application invoke re-authentication in addition to initial user authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 745

Report Export Collapse

Which of the following is the MOST important reason for timely installation of software patches?

Become a Premium Member for full access
  Unlock Premium Member

Question 746

Report Export Collapse

Which of the following is a method of attacking internet (IP) v6 Layer 3 and Layer 4 ?

Become a Premium Member for full access
  Unlock Premium Member

Question 747

Report Export Collapse

Which of the following would present the higher annualized loss expectancy (ALE)?

ISC CISSP image Question 263 46612 09182024210517000000

Become a Premium Member for full access
  Unlock Premium Member

Question 748

Report Export Collapse

An organization wants to enable uses to authenticate across multiple security domains. To accomplish this they have decided to use Federated Identity Management (F1M). Which of the following is used behind the scenes in a FIM deployment?

Become a Premium Member for full access
  Unlock Premium Member

Question 749

Report Export Collapse

Which of the following is the GREATEST security risk associated with the user of identity as a service (IDaaS) when an organization its own software?

Become a Premium Member for full access
  Unlock Premium Member

Question 750

Report Export Collapse

In the common criteria (CC) for information technology (IT) security evaluation, increasing Evaluation Assurance Levels (EAL) results in which of the following?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search