ISC CISSP Practice Test - Questions Answers, Page 84
List of questions
Question 831
Which of the following would an internal technical security audit BEST validate?
Question 832
Which of the following processes has the PRIMARY purpose of identifying outdated software versions, missing patches, and lapsed system updates?
Question 833
A development operations team would like to start building new applications delegating the cybersecurity responsibility as much as possible to the service provider. Which of the following environments BEST fits their need?
Question 834
Change management policies and procedures belong to which of the following types of controls?
Question 835
What access control scheme uses fine-grained rules to specify the conditions under which access to each data item or applications is granted?
Question 836
Why is planning the MOST critical phase of a Role Based Access Control (RBAC) implementation?
Question 837
Vulnerability scanners may allow for the administrator to assign which of the following in order to assist in prioritizing remediation activities?
Question 838
In order for application developers to detect potential vulnerabilities earlier during the Software Development Life Cycle (SDLC), which of the following safeguards should be implemented FIRST as part of a comprehensive testing framework?
Question 839
Physical assets defined in an organization's Business Impact Analysis (BIA) could include which of the following?
Question 840
What is the best way for mutual authentication of devices belonging to the same organization?
        
 
                                            
Question