ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers, Page 99

Question list
Search
Search

List of questions

Search

DRAG DROP

What is the correct order of steps in an information security assessment?

Place the information security assessment steps on the left next to the numbered boxes on the right in the correct order.

Question 981
Correct answer: Question 981

Explanation:

Section: Security Assessment and Testing

DRAG DROP

Match the functional roles in an external audit to their responsibilities.

Drag each role on the left to its corresponding responsibility on the right.

Question 982
Correct answer: Question 982

Explanation:

Section: Security Operations

DRAG DROP

Match the following generic software testing methods with their major focus and objective.

Drag each testing method next to its corresponding set of testing objectives.

Question 983
Correct answer: Question 983

Explanation:

Reference:

https://www.tutorialride.com/software-testing/software-test-types.htm

DRAG DROP

Given a file containing ordered number, i.e. "123456789," match each of the following redundant Array of independent Disks (RAID) levels to the corresponding visual representation visual representation. Note: P() = parity.

Drag each level to the appropriate place on the diagram.

Question 984
Correct answer: Question 984

DRAG DROP

Rank the Hypertext Transfer protocol (HTTP) authentication types shows below in order of relativestrength.

Drag the authentication type on the correct positions on the right according to strength from weakest to strongest.

Question 985
Correct answer: Question 985

HOTSPOT

Identify the component that MOST likely lacks digital accountability related to information access.

Click on the correct device in the image below.


Question 986
Correct answer: Question 986

DRAG DROP

Place the following information classification steps in sequential order.

Question 987
Correct answer: Question 987

HOTSPOT

Which Web Services Security (WS-Security) specification negotiates how security tokens will be issued, renewed and validated? Click on the correct specification in the image below.


Question 988
Correct answer: Question 988

Explanation:

WS-Trust The protocol used for issuing security tokens is based on WS-Trust. WS-Trust is a Web service specification that builds on WS-Security. It describes a protocol used for issuance, exchange, and validation of security tokens. WS-Trust provides a solution for interoperability by defining a protocol for issuing and exchanging security tokens, based on token format, namespace, or trust boundaries.

Reference: https://msdn.microsoft.com/en-us/library/ff650503.aspx

HOTSPOT

In the network design below, where is the MOST secure Local Area Network (LAN) segment to deploy a Wireless Access Point (WAP) that provides contractors access to the Internet and authorized enterprise services?


Question 989
Correct answer: Question 989

DRAG DROP

Place in order, from BEST (1) to WORST (4), the following methods to reduce the risk of data remanence on magnetic media.

Question 990
Correct answer: Question 990
Total 1.482 questions
Go to page: of 149