ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 77

List of questions

Question 761

Report Export Collapse

The threat modeling identifies a man-in-the-middle (MITM) exposure. Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?

Become a Premium Member for full access
  Unlock Premium Member

Question 762

Report Export Collapse

Which security architecture strategy could be applied to secure an operating system (OS) baseline for deployment within the corporate enterprise?

Become a Premium Member for full access
  Unlock Premium Member

Question 763

Report Export Collapse

What does the term "100-year floodplain" mean to emergency preparedness officials?

Become a Premium Member for full access
  Unlock Premium Member

Question 764

Report Export Collapse

Which layer of the Open system Interconnect (OSI) model is responsible for secure data transfer between applications, flow control, and error detection and correction?

Become a Premium Member for full access
  Unlock Premium Member

Question 765

Report Export Collapse

Which of the following is the PRIMARY consideration when determining the frequency an automated control should be assessed or monitored?

Become a Premium Member for full access
  Unlock Premium Member

Question 766

Report Export Collapse

An organization that has achieved a Capability Maturity model Integration (CMMI) level of 4 has done which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 767

Report Export Collapse

What is the MOST effective way to protect privacy?

Become a Premium Member for full access
  Unlock Premium Member

Question 768

Report Export Collapse

Internet protocol security (IPSec), point-to-point tunneling protocol (PPTP), and secure sockets Layer (SSL) all use Which of the following to prevent replay attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 769

Report Export Collapse

Which of the following job functions MUST be separated to maintain data and application integrity?

Become a Premium Member for full access
  Unlock Premium Member

Question 770

Report Export Collapse

Which of the following authorization standards is built to handle Application programming Interface (API) access for federated Identity management (FIM)?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search