Free Certification Practice Questions

ISC-CISSP

Loading…
An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference architecture would mobile devices be tracked?
#271
An application team is running tests to ensure that user entry fields will not accept invalid input of any length. What type of negative testing is this an example of?
#272
What is considered a compensating control for not having electrical surge protectors installed?
#273
What is the FIRST step in risk management?
#274
Which of the following is the PRIMARY goal of logical access controls?
#275
Which of the following is a covert channel type?
#276
A software developer wishes to write code that will execute safely and only as intended. Which of the following programming language types is MOST likely to achieve this goal?
#277
Which of the following is a secure design principle for a new product?
#278
What is the PRIMARY benefit of relying on Security Content Automation Protocol (SCAP)?
#279
Which application type is considered high risk and provides a common way for malware and viruses to enter a network?
#280
What are the three key benefits that application developers should derive from the northbound application programming interface (API) of software defined networking (SDN)?
#281
Which of the following is a unique feature of attribute-based access control (ABAC)?
#282