Free ISC2 CISSP Exam Braindumps (page: 55)

What is the BEST method to use for assessing the security impact of acquired software?

  1. Threat modeling
  2. Common vulnerability review
  3. Software security compliance validation
  4. Vendor assessment

Answer(s): A



Which of the following ensures old log data is not overwritten?

  1. Log retention
  2. Implement Syslog
  3. Increase log file size
  4. Log preservation

Answer(s): A



Under the General Data Protection Regulation (GDPR), what is the maximum amount of time allowed for reporting a personal data breach?

  1. 24 hours
  2. 48 hours
  3. 72 hours
  4. 96 hours

Answer(s): C



A financial organization that works according to agile principles has developed a new application for their external customer base to request a line of credit. A security analyst has been asked to assess the security risk of the minimum viable product (MVP). Which is the MOST important activity the analyst should assess?

  1. The software has been signed off for release by the product owner.
  2. The software had been branded according to corporate standards.
  3. The software has the correct functionality.
  4. The software has been code reviewed.

Answer(s): D






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

CISSP Exam Discussions & Posts