ISC CISSP Practice Test - Questions Answers, Page 80
List of questions
Related questions
Question 791
Functional security testing is MOST critical during which phase of the system development life cycle (SDLC)?
Question 792
What is the threat modeling order using process for Attack simu-lation and threat analysis (PASTA)?
Question 793
Which is the RECOMMENDED configuration mode for sensors for an intrusion prevention system (IPS) if the prevention capabilities will be used?
Question 794
An organization implements a remote access server (RAS), Once users connect to the server, digital certificates are used to authenticate their identity. What type of extensible Authentication protocol (EAP) would the organization use during this authentication?
Question 795
An analysis finds unusual activity coming from a computer that was thrown away several months prior, which of the following steps ensure the proper removal of the system?
Question 796
As a security manger which of the following is the MOST effective practice for providing value to an organization?
Question 797
Which of the following BEST provides for non-repudiation od user account actions?
Question 798
What type of access control determines the authorization to resource based on pre-defined job titles within an organization?
Question 799
As users switch roles within an organization, their accounts are given additional permissions to perform the duties of their new position. After a recent audit, it was discovered that many of these accounts maintained their old permissions as well. The obsolete permissions identified by the audit have been remediated and accounts have only the appropriate permissions to complete their jobs.
Which of the following is the BEST way to prevent access privilege creep?
Question 800
Continuity of operations is BEST supported by which of the following?
Question