ISC CISSP Practice Test - Questions Answers, Page 77
List of questions
Related questions
Question 761
The threat modeling identifies a man-in-the-middle (MITM) exposure. Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?
Question 762
Which security architecture strategy could be applied to secure an operating system (OS) baseline for deployment within the corporate enterprise?
Question 763
What does the term "100-year floodplain" mean to emergency preparedness officials?
Question 764
Which layer of the Open system Interconnect (OSI) model is responsible for secure data transfer between applications, flow control, and error detection and correction?
Question 765
Which of the following is the PRIMARY consideration when determining the frequency an automated control should be assessed or monitored?
Question 766
An organization that has achieved a Capability Maturity model Integration (CMMI) level of 4 has done which of the following?
Question 767
What is the MOST effective way to protect privacy?
Question 768
Internet protocol security (IPSec), point-to-point tunneling protocol (PPTP), and secure sockets Layer (SSL) all use Which of the following to prevent replay attacks?
Question 769
Which of the following job functions MUST be separated to maintain data and application integrity?
Question 770
Which of the following authorization standards is built to handle Application programming Interface (API) access for federated Identity management (FIM)?
Question