ISC CISSP Practice Test - Questions Answers, Page 80
List of questions
Question 791

Functional security testing is MOST critical during which phase of the system development life cycle (SDLC)?
Question 792

What is the threat modeling order using process for Attack simu-lation and threat analysis (PASTA)?
Question 793

Which is the RECOMMENDED configuration mode for sensors for an intrusion prevention system (IPS) if the prevention capabilities will be used?
Question 794

An organization implements a remote access server (RAS), Once users connect to the server, digital certificates are used to authenticate their identity. What type of extensible Authentication protocol (EAP) would the organization use during this authentication?
Question 795

An analysis finds unusual activity coming from a computer that was thrown away several months prior, which of the following steps ensure the proper removal of the system?
Question 796

As a security manger which of the following is the MOST effective practice for providing value to an organization?
Question 797

Which of the following BEST provides for non-repudiation od user account actions?
Question 798

What type of access control determines the authorization to resource based on pre-defined job titles within an organization?
Question 799

As users switch roles within an organization, their accounts are given additional permissions to perform the duties of their new position. After a recent audit, it was discovered that many of these accounts maintained their old permissions as well. The obsolete permissions identified by the audit have been remediated and accounts have only the appropriate permissions to complete their jobs.
Which of the following is the BEST way to prevent access privilege creep?
Question 800

Continuity of operations is BEST supported by which of the following?
Question