ISC CISSP Practice Test - Questions Answers, Page 80
List of questions
Related questions
Functional security testing is MOST critical during which phase of the system development life cycle (SDLC)?
What is the threat modeling order using process for Attack simu-lation and threat analysis (PASTA)?
Which is the RECOMMENDED configuration mode for sensors for an intrusion prevention system (IPS) if the prevention capabilities will be used?
An organization implements a remote access server (RAS), Once users connect to the server, digital certificates are used to authenticate their identity. What type of extensible Authentication protocol (EAP) would the organization use during this authentication?
An analysis finds unusual activity coming from a computer that was thrown away several months prior, which of the following steps ensure the proper removal of the system?
As a security manger which of the following is the MOST effective practice for providing value to an organization?
Which of the following BEST provides for non-repudiation od user account actions?
What type of access control determines the authorization to resource based on pre-defined job titles within an organization?
As users switch roles within an organization, their accounts are given additional permissions to perform the duties of their new position. After a recent audit, it was discovered that many of these accounts maintained their old permissions as well. The obsolete permissions identified by the audit have been remediated and accounts have only the appropriate permissions to complete their jobs.
Which of the following is the BEST way to prevent access privilege creep?
Continuity of operations is BEST supported by which of the following?
Question