New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Access ISC CISSP New Release

Page: 27 / 45
Total 1486 questions

Certified Information Systems Security Professional (CISSP) Questions and Answers

Question 105

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to

production programs?

Options:

A.

Modifying source code without approval

B.

Promoting programs to production without approval

C.

Developers checking out source code without approval

D.

Developers using Rapid Application Development (RAD) methodologies without approval

Question 106

Who is essential for developing effective test scenarios for disaster recovery (DR) test plans?

Options:

A.

Business line management and IT staff members

B.

Chief Information Officer (CIO) and DR manager

C.

DR manager end IT staff members

D.

IT staff members and project managers

Question 107

Which of the following is the PRIMARY goal of logical access controls?

Options:

A.

Restrict access to an information asset.

B.

Ensure integrity of an information asset.

C.

Restrict physical access to an information asset.

D.

Ensure availability of an information asset.

Question 108

Which of the following objects should be removed FIRST prior to uploading code to public code repositories?

Options:

A.

Security credentials

B.

Known vulnerabilities

C.

Inefficient algorithms

D.

Coding mistakes

Page: 27 / 45
Total 1486 questions