ExamGecko
Home / ISC / CISSP / List of questions
Ask Question

ISC CISSP Practice Test - Questions Answers, Page 99

List of questions

Question 981

Report Export Collapse

DRAG DROP

What is the correct order of steps in an information security assessment?

Place the information security assessment steps on the left next to the numbered boxes on the right in the correct order.

Become a Premium Member for full access
  Unlock Premium Member

Question 982

Report Export Collapse

DRAG DROP

Match the functional roles in an external audit to their responsibilities.

Drag each role on the left to its corresponding responsibility on the right.

Become a Premium Member for full access
  Unlock Premium Member

Question 983

Report Export Collapse

DRAG DROP

Match the following generic software testing methods with their major focus and objective.

Drag each testing method next to its corresponding set of testing objectives.

Become a Premium Member for full access
  Unlock Premium Member

Question 984

Report Export Collapse

DRAG DROP

Given a file containing ordered number, i.e. "123456789," match each of the following redundant Array of independent Disks (RAID) levels to the corresponding visual representation visual representation. Note: P() = parity.

Drag each level to the appropriate place on the diagram.

Become a Premium Member for full access
  Unlock Premium Member

Question 985

Report Export Collapse

DRAG DROP

Rank the Hypertext Transfer protocol (HTTP) authentication types shows below in order of relativestrength.

Drag the authentication type on the correct positions on the right according to strength from weakest to strongest.

Become a Premium Member for full access
  Unlock Premium Member

Question 986

Report Export Collapse

HOTSPOT

Identify the component that MOST likely lacks digital accountability related to information access.

Click on the correct device in the image below.


Become a Premium Member for full access
  Unlock Premium Member

Question 987

Report Export Collapse

DRAG DROP

Place the following information classification steps in sequential order.

Become a Premium Member for full access
  Unlock Premium Member

Question 988

Report Export Collapse

HOTSPOT

Which Web Services Security (WS-Security) specification negotiates how security tokens will be issued, renewed and validated? Click on the correct specification in the image below.


Become a Premium Member for full access
  Unlock Premium Member

Question 989

Report Export Collapse

HOTSPOT

In the network design below, where is the MOST secure Local Area Network (LAN) segment to deploy a Wireless Access Point (WAP) that provides contractors access to the Internet and authorized enterprise services?


Become a Premium Member for full access
  Unlock Premium Member

Question 990

Report Export Collapse

DRAG DROP

Place in order, from BEST (1) to WORST (4), the following methods to reduce the risk of data remanence on magnetic media.

Become a Premium Member for full access
  Unlock Premium Member
Total 1.482 questions
Go to page: of 149
Search