Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 123 discussion

Actual exam question from ISC's CISSP
Question #: 123
Topic #: 1
[All CISSP Questions]

Which of the following is a common term for log reviews, synthetic transactions, and code reviews?

  • A. Application development
  • B. Spiral development functional testing
  • C. Security control testing
  • D. DevOps Integrated Product Team (IPT) development
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
dev46
Highly Voted 2 years, 2 months ago
Selected Answer: C
Conduct Security Control Testing Organizations must manage the security control testing that occurs to ensure that all security controls are tested thoroughly by authorized individuals. The facets of security control testing that organizations must include are vulnerability assessments, penetration testing, log reviews, synthetic transactions, code review and testing, misuse case testing, test coverage analysis, and interface testing. https://www.pearsonitcertification.com/articles/article.aspx?p=2931575&seqNum=2
upvoted 10 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
maawar83
Most Recent 10 months, 4 weeks ago
the Answer should be A: all these testing are more related to applications development and sustaining. The common term for log reviews, synthetic transactions, and code reviews is "Monitoring." Monitoring involves systematically observing, checking, and analyzing various aspects of a system, application, or codebase to ensure its proper functioning, security, and performance. Each of the activities mentioned falls under the broader umbrella of monitoring
upvoted 2 times
...
Bach1968
1 year, 4 months ago
Selected Answer: C
The common term for log reviews, synthetic transactions, and code reviews is "security control testing" (option C). Log reviews involve analyzing system logs to identify any suspicious or anomalous activities that may indicate security incidents or policy violations. Synthetic transactions refer to simulated interactions with an application or system to test its behavior and response. Code reviews involve examining the source code of an application or software to identify security vulnerabilities and ensure compliance with coding standards. All these activities fall under the broader category of security control testing, which aims to assess the effectiveness of security controls implemented within an organization's systems and applications. By conducting security control testing, organizations can identify weaknesses, vulnerabilities, and compliance gaps in their security measures and take appropriate remedial actions.
upvoted 2 times
...
Jamati
2 years ago
Selected Answer: C
According to Chapter 15 of the Official Study Guide, 9th edition, Security Control Testing is comprised of the following: Vulnerability assessment Penetration testing Log reviews Synthetic transactions Code review and testing Misuse case testing Test coverage analysis Interface testing Breach attack simulations Compliance checks
upvoted 3 times
...
franbarpro
2 years, 1 month ago
Selected Answer: C
Yep "C" it is. I thought of Spiral development functional testing first... but that's just an SDLC model used for risk management.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...