ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 20 )

Updated On: 19-Jan-2026

What is the BEST way to restrict access to a file system on computing systems?

  1. Use least privilege at each level to restrict access.
  2. Restrict access to all users.
  3. Allow a user group to restrict access.
  4. Use a third-party tool to restrict access.

Answer(s): A



Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?

  1. Avoid lengthy audit reports
  2. Enable generation of corrective action reports
  3. Facilitate a root cause analysis (RCA)
  4. Lower costs throughout the System Development Life Cycle (SDLC)

Answer(s): C



What is the correct order of execution for security architecture?

  1. Governance, strategy and program management, operations, project delivery
  2. Governance, strategy and program management, project delivery, operations
  3. Strategy and program management, project delivery, governance, operations
  4. Strategy and program management, governance, project delivery, operations

Answer(s): B



An international organization has decided to use a Software as a Service (SaaS) solution to support its business operations. Which of the following compliance standards should the organization use to assess the international code security and data privacy of the solution?

  1. Service Organization Control (SOC) 2
  2. Information Assurance Technical Framework (IATF)
  3. Health Insurance Portability and Accountability Act (HIPAA)
  4. Payment Card Industry (PCI)

Answer(s): A



Viewing page 20 of 122
Viewing questions 77 - 80 out of 484 questions



Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion