ISC CISSP Practice Test - Questions Answers, Page 85
List of questions
Related questions
Which of the following encryption types is used in Hash Message Authentication Code (HMAC) for key distribution?
Compared with hardware cryptography, software cryptography is generally
A financial company has decided to move its main business application to the Cloud. The legal department objects, arguing that the move of the platform should comply with several regulatory obligations such as the General Data Protection (GDPR) and ensure data confidentiality. The Chief Information Security Officer (CISO) says that the cloud provider has met all regulations requirements and even provides its own encryption solution with internally-managed encryption keys to address data confidentiality. Did the CISO address all the legal requirements in this situation?
An employee receives a promotion that entities them to access higher-level functions on the company's accounting system, as well as keeping their access to the previous system that is no longer needed or applicable. What is the name of the process that tries to remove this excess privilege?
Which of the following is PRIMARILY adopted for ensuring the integrity of information is preserved?
Why might a network administrator choose distributed virtual switches instead of stand-alone switches for network segmentation?
An organization has implemented a new backup process which protects confidential data by encrypting the information stored on backup tapes. Which of the following is a MAJOR data confidentiality concern after the implementation of this new backup process?
Organization A is adding a large collection of confidential data records that it received when it acquired Organization B to its data store. Many of the users and staff from Organization B are no longer available. Which of the following MUST
Organization A 0do to property classify and secure the acquired data?
An organization has a short-term agreement with a public Cloud Service Provider (CSP). Which of the following BEST protects sensitive data once the agreement expires and the assets are reused?
Which of the following techniques is effective to detect taps in fiber optic cables?
Question