ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 27 )

Updated On: 19-Jan-2026

What is the BEST method to use for assessing the security impact of acquired software?

  1. Threat modeling
  2. Common vulnerability review
  3. Software security compliance validation
  4. Vendor assessment

Answer(s): A



Which of the following ensures old log data is not overwritten?

  1. Log retention
  2. Implement Syslog
  3. Increase log file size
  4. Log preservation

Answer(s): A



Under the General Data Protection Regulation (GDPR), what is the maximum amount of time allowed for reporting a personal data breach?

  1. 24 hours
  2. 48 hours
  3. 72 hours
  4. 96 hours

Answer(s): C



A financial organization that works according to agile principles has developed a new application for their external customer base to request a line of credit. A security analyst has been asked to assess the security risk of the minimum viable product (MVP). Which is the MOST important activity the analyst should assess?

  1. The software has been signed off for release by the product owner.
  2. The software had been branded according to corporate standards.
  3. The software has the correct functionality.
  4. The software has been code reviewed.

Answer(s): D



Viewing page 27 of 122
Viewing questions 105 - 108 out of 484 questions



Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion