Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
International Information Systems Security (ISC)
Exam 3: Certified Information Systems Security Professional
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 301
Multiple Choice
During which of the following processes is least privilege implemented for a user account?
Question 302
Multiple Choice
Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?
Question 303
Multiple Choice
Which of the following actions will reduce risk to a laptop before traveling to a high risk area?
Question 304
Multiple Choice
The use of private and public encryption keys is fundamental in the implementation of which of the following?
Question 305
Multiple Choice
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that
Question 306
Multiple Choice
Which of the following Service Organization Control (SOC) report types should an organization request if they require a period of time report covering security and availability for a particular system?
Question 307
Multiple Choice
Which of the following is considered the PRIMARY security issue associated with encrypted e-mail messages?
Question 308
Multiple Choice
When dealing with compliance with the Payment Card Industry-Data Security Standard (PCI-DSS) , an organization that shares card holder information with a service provider MUST do which of the following?
Question 309
Multiple Choice
A company was ranked as high in the following National Institute of Standards and Technology (NIST) functions: Protect, Detect, Respond and Recover. However, a low maturity grade was attributed to the Identify function. In which of the following the controls categories does this company need to improve when analyzing its processes individually?
Question 310
Multiple Choice
What is the FIRST step required in establishing a records retention program?
Question 311
Multiple Choice
What is the FIRST step in establishing an information security program?
Question 312
Multiple Choice
Which of the following is MOST effective in detecting information hiding in Transmission Control Protocol/Internet Protocol (TCP/IP) traffic?
Question 313
Multiple Choice
A security practitioner has just been assigned to address an ongoing Denial of Service (DoS) attack against the company's network, which includes an e-commerce web site. The strategy has to include defenses for any size of attack without rendering the company network unusable. Which of the following should be a PRIMARY concern when addressing this issue?
Question 314
Multiple Choice
A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?
Question 315
Multiple Choice
A security team member was selected as a member of a Change Control Board (CCB) for an organization. Which of the following is one of their responsibilities?
Question 316
Multiple Choice
Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center?
Question 317
Multiple Choice
An Intrusion Detection System (IDS) has recently been deployed in a Demilitarized Zone (DMZ) . The IDS detects a flood of malformed packets. Which of the following BEST describes what has occurred?