Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

ISC CISSP Online Access

Page: 35 / 45
Question 140

Which of the following is the final phase of the identity and access provisioning lifecycle?

Options:

A.

Recertification

B.

Revocation

C.

Removal

D.

Validation

Question 141

Which type of security testing is being performed when an ethical hacker has no knowledge about the target system but the testing target is notified before the test?

Options:

A.

Reversal

B.

Gray box

C.

Blind

D.

White box

Question 142

A mobile device application that restricts the storage of user information to just that which is needed to accomplish lawful business goals adheres to what privacy principle?

Options:

A.

Onward transfer

B.

Collection Limitation

C.

Collector Accountability

D.

Individual Participation

Question 143

During the Security Assessment and Authorization process, what is the PRIMARY purpose for conducting a hardware and software inventory?

Options:

A.

Calculate the value of assets being accredited.

B.

Create a list to include in the Security Assessment and Authorization package.

C.

Identify obsolete hardware and software.

D.

Define the boundaries of the information system.

Page: 35 / 45
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Nov 23, 2024
Questions: 1486
CISSP pdf

CISSP PDF

$119.7  $399
CISSP Engine

CISSP Testing Engine

$134.7  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$179.7  $599