Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CISSP Study Group

Public • 1.1k • Free

22 contributions to CISSP Study Group
Practice Question
A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system . What PRIMARY action should be taken to improve SIEM performance? A. Implement role-based system monitoring B. Audit firewall logs to identify the source of login attempts C. Enhance logging detail D. Confirm alarm thresholds
0
2
New comment 1d ago
Practice Question
An attacker has intruded into the source code management system and is able to download but not modify the code. Which of the following aspects of the code theft has the HIGHEST security impact? A. The attacker could publicly share confidential comments found in the stolen code. B. Competitors might be able to steal the organization’s ideas by looking at the stolen code. C. A competitor could run their own copy of the organization’s website using the stolen code. D. Administrative credentials or keys hard-coded within the stolen code could be used to access sensitive data.
2
4
New comment 13d ago
0 likes • 14d
@Vincent Primiani On coursehero.com
Practice Question
Which of the following has the responsibility of information technology (IT) governance? A. Chief Information Officer (CIO) B. Senior IT Management C. Board of Directors D. Chief Information Security Officer (CISO)
1
4
New comment 19d ago
2 likes • 21d
@Anand Agarwal From my point of view, the answer is C - please refer to this link: How Responsible for IT Governance Is the BoD?
Practice Question
Which of the following is the FIRST requirement a data owner should consider before implementing a data retention policy? A. Training B. Legal C. Business D. Storage
0
7
New comment 22d ago
0 likes • 23d
@Tom de Tukker, Thanks for your explanation. From my point of view, business needs play a key role in defining the data retention policy to align with operational goals, but ensuring legal compliance should take precedence to guarantee its effectiveness. So, my answer is B - Legal. Please refer to this link, 'Data Retention Policy: What Is It and How to Build One', and read the section titled 'How do you create a data retention policy?'
1 like • 22d
@Tom de Tukker Much appreciated for the clear explanation. I completely agree with you. 🙏
Practice Question
Which of the following BEST obtains an objective audit of security controls?
Poll
6 members have voted
0
0
1-10 of 22
@owen-chin-6820
IT Manager

Active 23h ago
Joined Jun 28, 2024
powered by