Free ISC2 CISSP Exam Braindumps (page: 20)

What is the BEST way to restrict access to a file system on computing systems?

  1. Use least privilege at each level to restrict access.
  2. Restrict access to all users.
  3. Allow a user group to restrict access.
  4. Use a third-party tool to restrict access.

Answer(s): A



Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?

  1. Avoid lengthy audit reports
  2. Enable generation of corrective action reports
  3. Facilitate a root cause analysis (RCA)
  4. Lower costs throughout the System Development Life Cycle (SDLC)

Answer(s): C



What is the correct order of execution for security architecture?

  1. Governance, strategy and program management, operations, project delivery
  2. Governance, strategy and program management, project delivery, operations
  3. Strategy and program management, project delivery, governance, operations
  4. Strategy and program management, governance, project delivery, operations

Answer(s): B



An international organization has decided to use a Software as a Service (SaaS) solution to support its business operations. Which of the following compliance standards should the organization use to assess the international code security and data privacy of the solution?

  1. Service Organization Control (SOC) 2
  2. Information Assurance Technical Framework (IATF)
  3. Health Insurance Portability and Accountability Act (HIPAA)
  4. Payment Card Industry (PCI)

Answer(s): A






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

CISSP Exam Discussions & Posts