ISC CISSP Practice Test - Questions Answers, Page 99
Related questions
Question 981
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
DRAG DROP
What is the correct order of steps in an information security assessment?
Place the information security assessment steps on the left next to the numbered boxes on the right in the correct order.
Explanation:
Section: Security Assessment and Testing
Question 982
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
DRAG DROP
Match the functional roles in an external audit to their responsibilities.
Drag each role on the left to its corresponding responsibility on the right.
Explanation:
Section: Security Operations
Question 983
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
DRAG DROP
Match the following generic software testing methods with their major focus and objective.
Drag each testing method next to its corresponding set of testing objectives.
Explanation:
Reference:
https://www.tutorialride.com/software-testing/software-test-types.htm
Question 984
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
DRAG DROP
Given a file containing ordered number, i.e. "123456789," match each of the following redundant Array of independent Disks (RAID) levels to the corresponding visual representation visual representation. Note: P() = parity.
Drag each level to the appropriate place on the diagram.
Question 985
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
DRAG DROP
Rank the Hypertext Transfer protocol (HTTP) authentication types shows below in order of relativestrength.
Drag the authentication type on the correct positions on the right according to strength from weakest to strongest.
Question 986
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
HOTSPOT
Identify the component that MOST likely lacks digital accountability related to information access.
Click on the correct device in the image below.
Question 987
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
DRAG DROP
Place the following information classification steps in sequential order.
Question 988
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
HOTSPOT
Which Web Services Security (WS-Security) specification negotiates how security tokens will be issued, renewed and validated? Click on the correct specification in the image below.
Explanation:
WS-Trust The protocol used for issuing security tokens is based on WS-Trust. WS-Trust is a Web service specification that builds on WS-Security. It describes a protocol used for issuance, exchange, and validation of security tokens. WS-Trust provides a solution for interoperability by defining a protocol for issuing and exchanging security tokens, based on token format, namespace, or trust boundaries.
Reference: https://msdn.microsoft.com/en-us/library/ff650503.aspx
Question 989
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
HOTSPOT
In the network design below, where is the MOST secure Local Area Network (LAN) segment to deploy a Wireless Access Point (WAP) that provides contractors access to the Internet and authorized enterprise services?
Question 990
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
DRAG DROP
Place in order, from BEST (1) to WORST (4), the following methods to reduce the risk of data remanence on magnetic media.
Question