ISC CISSP Practice Test - Questions Answers, Page 77
List of questions
Question 761

The threat modeling identifies a man-in-the-middle (MITM) exposure. Which countermeasure should the information system security officer (ISSO) select to mitigate the risk of a protected Health information (PHI) data leak?
Question 762

Which security architecture strategy could be applied to secure an operating system (OS) baseline for deployment within the corporate enterprise?
Question 763

What does the term "100-year floodplain" mean to emergency preparedness officials?
Question 764

Which layer of the Open system Interconnect (OSI) model is responsible for secure data transfer between applications, flow control, and error detection and correction?
Question 765

Which of the following is the PRIMARY consideration when determining the frequency an automated control should be assessed or monitored?
Question 766

An organization that has achieved a Capability Maturity model Integration (CMMI) level of 4 has done which of the following?
Question 767

What is the MOST effective way to protect privacy?
Question 768

Internet protocol security (IPSec), point-to-point tunneling protocol (PPTP), and secure sockets Layer (SSL) all use Which of the following to prevent replay attacks?
Question 769

Which of the following job functions MUST be separated to maintain data and application integrity?
Question 770

Which of the following authorization standards is built to handle Application programming Interface (API) access for federated Identity management (FIM)?
Question