ExamGecko

ISC CISSP Practice Test - Questions Answers, Page 99

Question list
Search
Search

List of questions

Search

Question 981

Report
Export
Collapse

DRAG DROP

What is the correct order of steps in an information security assessment?

Place the information security assessment steps on the left next to the numbered boxes on the right in the correct order.

Question 981
Correct answer: Question 981

Explanation:

Section: Security Assessment and Testing

asked 18/09/2024
chalapathy naidu
39 questions

Question 982

Report
Export
Collapse

DRAG DROP

Match the functional roles in an external audit to their responsibilities.

Drag each role on the left to its corresponding responsibility on the right.

Question 982
Correct answer: Question 982

Explanation:

Section: Security Operations

asked 18/09/2024
Jendoubi moez
36 questions

Question 983

Report
Export
Collapse

DRAG DROP

Match the following generic software testing methods with their major focus and objective.

Drag each testing method next to its corresponding set of testing objectives.

Question 983
Correct answer: Question 983

Explanation:

Reference:

https://www.tutorialride.com/software-testing/software-test-types.htm

asked 18/09/2024
Anna Pytka
32 questions

Question 984

Report
Export
Collapse

DRAG DROP

Given a file containing ordered number, i.e. "123456789," match each of the following redundant Array of independent Disks (RAID) levels to the corresponding visual representation visual representation. Note: P() = parity.

Drag each level to the appropriate place on the diagram.

Question 984
Correct answer: Question 984
asked 18/09/2024
Sorin Craia
39 questions

Question 985

Report
Export
Collapse

DRAG DROP

Rank the Hypertext Transfer protocol (HTTP) authentication types shows below in order of relativestrength.

Drag the authentication type on the correct positions on the right according to strength from weakest to strongest.

Question 985
Correct answer: Question 985
asked 18/09/2024
Mk Cheng
43 questions

Question 986

Report
Export
Collapse

HOTSPOT

Identify the component that MOST likely lacks digital accountability related to information access.

Click on the correct device in the image below.


Question 986
Correct answer: Question 986
asked 18/09/2024
James Valdivia
30 questions

Question 987

Report
Export
Collapse

DRAG DROP

Place the following information classification steps in sequential order.

Question 987
Correct answer: Question 987
asked 18/09/2024
Elizaveta Kutuzova
54 questions

Question 988

Report
Export
Collapse

HOTSPOT

Which Web Services Security (WS-Security) specification negotiates how security tokens will be issued, renewed and validated? Click on the correct specification in the image below.


Question 988
Correct answer: Question 988

Explanation:

WS-Trust The protocol used for issuing security tokens is based on WS-Trust. WS-Trust is a Web service specification that builds on WS-Security. It describes a protocol used for issuance, exchange, and validation of security tokens. WS-Trust provides a solution for interoperability by defining a protocol for issuing and exchanging security tokens, based on token format, namespace, or trust boundaries.

Reference: https://msdn.microsoft.com/en-us/library/ff650503.aspx

asked 18/09/2024
Bianca Duizer
48 questions

Question 989

Report
Export
Collapse

HOTSPOT

In the network design below, where is the MOST secure Local Area Network (LAN) segment to deploy a Wireless Access Point (WAP) that provides contractors access to the Internet and authorized enterprise services?


Question 989
Correct answer: Question 989
asked 18/09/2024
Gofaone Ncube
42 questions

Question 990

Report
Export
Collapse

DRAG DROP

Place in order, from BEST (1) to WORST (4), the following methods to reduce the risk of data remanence on magnetic media.

Question 990
Correct answer: Question 990
asked 18/09/2024
Melissa Taylor
30 questions
Total 1.482 questions
Go to page: of 149