ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 80

List of questions

Question 791

Report Export Collapse

Functional security testing is MOST critical during which phase of the system development life cycle (SDLC)?

Become a Premium Member for full access
  Unlock Premium Member

Question 792

Report Export Collapse

What is the threat modeling order using process for Attack simu-lation and threat analysis (PASTA)?

Become a Premium Member for full access
  Unlock Premium Member

Question 793

Report Export Collapse

Which is the RECOMMENDED configuration mode for sensors for an intrusion prevention system (IPS) if the prevention capabilities will be used?

Become a Premium Member for full access
  Unlock Premium Member

Question 794

Report Export Collapse

An organization implements a remote access server (RAS), Once users connect to the server, digital certificates are used to authenticate their identity. What type of extensible Authentication protocol (EAP) would the organization use during this authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 795

Report Export Collapse

An analysis finds unusual activity coming from a computer that was thrown away several months prior, which of the following steps ensure the proper removal of the system?

Become a Premium Member for full access
  Unlock Premium Member

Question 796

Report Export Collapse

As a security manger which of the following is the MOST effective practice for providing value to an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 797

Report Export Collapse

Which of the following BEST provides for non-repudiation od user account actions?

Become a Premium Member for full access
  Unlock Premium Member

Question 798

Report Export Collapse

What type of access control determines the authorization to resource based on pre-defined job titles within an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 799

Report Export Collapse

As users switch roles within an organization, their accounts are given additional permissions to perform the duties of their new position. After a recent audit, it was discovered that many of these accounts maintained their old permissions as well. The obsolete permissions identified by the audit have been remediated and accounts have only the appropriate permissions to complete their jobs.

Which of the following is the BEST way to prevent access privilege creep?

Become a Premium Member for full access
  Unlock Premium Member

Question 800

Report Export Collapse

Continuity of operations is BEST supported by which of the following?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149