cissp_99
cissp_99
ISC2
Exam Questions CISSP
Certified Information Systems Security Professional (CISSP)
NEW QUESTION 1
- (Exam Topic 1)
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?
Answer: C
NEW QUESTION 2
- (Exam Topic 1)
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that
Answer: B
NEW QUESTION 3
- (Exam Topic 1)
Which of the following actions will reduce risk to a laptop before traveling to a high risk area?
Answer: D
NEW QUESTION 4
- (Exam Topic 1)
Intellectual property rights are PRIMARY concerned with which of the following?
Answer: D
NEW QUESTION 5
- (Exam Topic 1)
What is the MOST important consideration from a data security perspective when an organization plans to relocate?
A. Ensure the fire prevention and detection systems are sufficient to protect personnel
B. Review the architectural plans to determine how many emergency exits are present
C. Conduct a gap analysis of a new facilities against existing security requirements
D. Revise the Disaster Recovery and Business Continuity (DR/BC) plan
Answer: C
NEW QUESTION 6
- (Exam Topic 2)
Which of the following is an initial consideration when developing an information security management system?
Answer: B
NEW QUESTION 7
- (Exam Topic 2)
Which of the following is MOST important when assigning ownership of an asset to a department?
Answer: B
NEW QUESTION 8
- (Exam Topic 2)
Which of the following BEST describes the responsibilities of a data owner?
A. Ensuring quality and validation through periodic audits for ongoing data integrity
B. Maintaining fundamental data availability, including data storage and archiving
C. Ensuring accessibility to appropriate users, maintaining appropriate levels of data security
D. Determining the impact the information has on the mission of the organization
Answer: C
NEW QUESTION 9
- (Exam Topic 3)
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified
automated vulnerability assessments?
Answer: B
NEW QUESTION 10
- (Exam Topic 3)
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?
Answer: A
NEW QUESTION 10
- (Exam Topic 3)
The use of private and public encryption keys is fundamental in the implementation of which of the following?
A. Diffie-Hellman algorithm
B. Secure Sockets Layer (SSL)
C. Advanced Encryption Standard (AES)
D. Message Digest 5 (MD5)
Answer: A
NEW QUESTION 15
- (Exam Topic 3)
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
A. Implementation Phase
B. Initialization Phase
C. Cancellation Phase
D. Issued Phase
Answer: D
NEW QUESTION 17
- (Exam Topic 4)
An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly
implement a control?
Answer: A
NEW QUESTION 21
- (Exam Topic 4)
An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the
MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?
Answer: D
NEW QUESTION 25
- (Exam Topic 4)
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Answer: A
NEW QUESTION 28
- (Exam Topic 5)
Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual
employee’s salary?
Answer: C
NEW QUESTION 31
- (Exam Topic 5)
Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile
devices?
A. Derived credential
B. Temporary security credential
C. Mobile device credentialing service
D. Digest authentication
Answer: A
NEW QUESTION 33
- (Exam Topic 6)
Which of the following could cause a Denial of Service (DoS) against an authentication system?
Answer: D
NEW QUESTION 35
- (Exam Topic 6)
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s
access to data files?
Answer: A
NEW QUESTION 38
- (Exam Topic 6)
Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?
A. Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken
B. Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability
C. Management teams will understand the testing objectives and reputational risk to the organization
D. Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels
Answer: D
NEW QUESTION 42
- (Exam Topic 7)
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24
hours?
A. Warm site
B. Hot site
C. Mirror site
D. Cold site
Answer: A
NEW QUESTION 46
- (Exam Topic 7)
Which of the following is a PRIMARY advantage of using a third-party identity service?
Answer: D
NEW QUESTION 51
- (Exam Topic 7)
What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?
Answer: D
NEW QUESTION 55
- (Exam Topic 7)
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST
probable cause?
Answer: D
NEW QUESTION 60
- (Exam Topic 7)
With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?
Answer: B
NEW QUESTION 65
- (Exam Topic 7)
When is a Business Continuity Plan (BCP) considered to be valid?
Answer: D
NEW QUESTION 68
- (Exam Topic 7)
What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?
Answer: C
NEW QUESTION 71
- (Exam Topic 7)
Which of the following is the FIRST step in the incident response process?
Answer: D
NEW QUESTION 73
- (Exam Topic 8)
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
A. After the system preliminary design has been developed and the data security categorization has been performed
B. After the vulnerability analysis has been performed and before the system detailed design begins
C. After the system preliminary design has been developed and before the data security categorization begins
D. After the business functional analysis and the data security categorization have been performed
Answer: C
NEW QUESTION 75
- (Exam Topic 8)
What is the BEST approach to addressing security issues in legacy web applications?
Answer: D
NEW QUESTION 76
- (Exam Topic 8)
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?
Answer: D
NEW QUESTION 77
- (Exam Topic 9)
What is the FIRST step in developing a security test and its evaluation?
Answer: C
NEW QUESTION 82
- (Exam Topic 9)
Which of the following is ensured when hashing files during chain of custody handling?
A. Availability
B. Accountability
C. Integrity
D. Non-repudiation
Answer: C
NEW QUESTION 86
- (Exam Topic 9)
Logical access control programs are MOST effective when they are
Answer: D
NEW QUESTION 88
- (Exam Topic 9)
A vulnerability test on an Information System (IS) is conducted to
Answer: C
NEW QUESTION 89
- (Exam Topic 9)
In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?
A. Communication
B. Planning
C. Recovery
D. Escalation
Answer: A
NEW QUESTION 92
- (Exam Topic 9)
An internal Service Level Agreement (SLA) covering security is signed by senior managers and is in place. When should compliance to the SLA be reviewed to
ensure that a good security posture is being delivered?
Answer: D
NEW QUESTION 93
- (Exam Topic 9)
Why is a system's criticality classification important in large organizations?
A. It provides for proper prioritization and scheduling of security and maintenance tasks.
B. It reduces critical system support workload and reduces the time required to apply patches.
C. It allows for clear systems status communications to executive management.
D. It provides for easier determination of ownership, reducing confusion as to the status of the asset.
Answer: A
NEW QUESTION 98
- (Exam Topic 9)
Which one of the following transmission media is MOST effective in preventing data interception?
A. Microwave
B. Twisted-pair
C. Fiber optic
D. Coaxial cable
Answer: C
A. Physical
B. Session
C. Transport
D. Data-Link
Answer: C
approaches?
Answer: D
Answer: A
A. control.
B. permission.
C. procedure.
D. protocol.
Answer: B
A. Network availability
B. Data integrity
C. Network bandwidth
D. Node locations
Answer: C
A. Spam filtering
B. Cryptographic signature
C. Uniform Resource Locator (URL) filtering
D. Reverse Domain Name Service (DNS) lookup
Answer: B
Answer: D
A. Vulnerability to crime
B. Adjacent buildings and businesses
C. Proximity to an airline flight path
D. Vulnerability to natural disasters
Answer: C
- (Exam Topic 9)
Multi-threaded applications are more at risk than single-threaded applications to
A. race conditions.
B. virus infection.
C. packet sniffing.
D. database injection.
Answer: A
Answer: D
Answer: A
Answer: B
Answer: B
Answer: A
A. Job rotation
B. Separation of duties
C. Least privilege model
D. Increased monitoring
Answer: B
Answer: D
Answer: C
Answer: A
Answer: C
Answer: A
Answer: A
A. The service provider's policies are consistent with ISO/IEC27001 and there is evidence that the service provider is following those policies.
B. The service provider will segregate the data within its systems and ensure that each region's policies are met.
C. The service provider will impose controls and protections that meet or exceed the current systemscontrols and produce audit logs as verification.
D. The service provider's policies can meet the requirements imposed by the new environment even if they differ from the organization's current policies.
Answer: D
A. Determining the probability that the system functions safely during any time period
B. Quantifying the system's available services
C. Identifying the number of security flaws within the system
D. Measuring the system's integrity in the presence of failure
Answer: C
Answer: D
Answer: D
A. Cryptographic checksums
B. Version numbering
C. Automatic updates
D. Vendor assurance
Answer: A
Answer: D
Answer: A
D. Address Masking
Answer: A
Answer: C
Answer: B
A. system software.
B. system hardware.
C. application software.
D. network hardware.
Answer: A
Answer: C
Answer: B
Answer: A
A. Detection
B. Prevention
C. Investigation
D. Correction
Answer: A
Answer: C
Answer: D
A. Exceed the threshold limit of the connection queue for a given service
B. Set the threshold to zero for a given service
C. Cause the buffer to overflow, allowing root access
D. Flush the register stack, allowing hijacking of the root account
Answer: A
A. Trusted path
B. Malicious logic
C. Social engineering
D. Passive misuse
Answer: C
Answer: B
Answer: A
- (Exam Topic 9)
What maintenance activity is responsible for defining, implementing, and testing updates to application systems?
Answer: A
A. Technical management
B. Change control board
C. System operations
D. System users
Answer: B
A. A dictionary attack
B. A Denial of Service (DoS) attack
C. A spoofing attack
D. A backdoor installation
Answer: A
Answer: C
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: B
A. Show the need for security; identify the message and the audience
B. Ensure that the security presentation is designed to be all-inclusive
C. Notify them that their compliance is mandatory
D. Explain how hackers have enhanced information security
Answer: A
A. Sandbox
B. Change control
C. Memory management
D. Public-Key Infrastructure (PKI)
Answer: A
Answer: B
A. Disassembly, analysis, or reverse engineering will reveal the security functionality of the computer system.
B. Algorithms must be protected to ensure the security and interoperability of the designed system.
C. A knowledgeable user should have limited privileges on the system to prevent their ability to compromise security capabilities.
D. The security of a mechanism should not depend on the secrecy of its design or implementation.
Answer: D
Answer: C
Answer: B
A. Non-repudiation
B. Traceability
C. Anonymity
D. Resilience
Answer: C
A. Requirements Analysis
B. Development and Deployment
C. Production Operations
D. Utilization Support
Answer: A
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Backup Media
Reference: Official (ISC)2 Guide to the CISSP CBK, Third Edition page 1029
Answer: B
Answer: C
A. Audit policy
B. Security log
C. Security policies
D. Configuration settings
Answer: C
Answer: B
Answer: C
A. Inadequate IT support
B. Loss of data and separation of duties
C. Undocumented security controls
D. Additional responsibilities for remaining staff
Answer: B
A. default gateway.
B. attacker's address.
C. local interface being attacked.
D. specified source address.
Answer: D
Answer: A
A. 802.11i
B. Kerberos
C. Lightweight Directory Access Protocol (LDAP)
D. Security Assertion Markup Language (SAML)
Answer: D
Answer: D
Answer: C
Answer: A
A. Two-factor authentication
B. Digital certificates and hardware tokens
C. Timed sessions and Secure Socket Layer (SSL)
D. Passwords with alpha-numeric and special characters
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
D. Associated clearance
Answer: A
Answer: B
A. An initialization check
B. An identification check
C. An authentication check
D. An authorization check
Answer: C
Answer: C
A. System integrity
B. System availability
C. System confidentiality
D. System auditability
Answer: B
Answer: B
Answer: D
Answer: D
Answer: C
A. User A
B. User B
C. User C
D. User D
Answer: D
Answer: B
A. Information security
B. Departmental management
C. Data custodian
D. Data owner
Answer: D
Answer: C
A. least privilege.
B. rule based access controls.
C. Mandatory Access Control (MAC).
D. separation of duties.
Answer: D
Answer: B
A. Security procedures
B. Security standards
C. Human resource policy
D. Human resource standards
Answer: B
Answer: B
A. Severity of risk
B. Complexity of strategy
C. Frequency of incidents
D. Ongoing awareness
Answer: A
Answer: A
A. Least privilege
B. Lattice Based Access Control (LBAC)
C. Role Based Access Control (RBAC)
D. Lightweight Directory Access Control (LDAP)
Answer: C
Answer: D
Answer: B
Answer: C
A. Provide students with Internet Protocol Security (IPSec) Virtual Private Network (VPN) client software.
B. Use Secure Sockets Layer (SSL) VPN technology.
C. Use Secure Shell (SSH) with public/private keys.
D. Require students to purchase home router capable of VPN.
Answer: B
In a Bell-LaPadula system, which user has the MOST restrictions when writing data to any of the four files?
A. User A
B. User B
C. User C
D. User D
Answer: D
A. Commercial products often have serious weaknesses of the magnetic force available in the degausser product.
B. Degausser products may not be properly maintained and operated.
C. The inability to turn the drive around in the chamber for the second pass due to human error.
D. Inadequate record keeping when sanitizing mediA.
Answer: B
A. Timing
B. Cold boot
C. Side channel
D. Acoustic cryptanalysis
Answer: B
Answer: D
A. application dismissal.
B. business procedures.
C. digital certificates expiration.
D. regulatory compliance.
Answer: D
Answer: B
A. Brute force
B. Tampering
C. Information disclosure
D. Denial of Service (DoS)
Answer: C
Answer: B
Answer: B
Answer: B
Answer: C
A. The organizational structure of the third party and how it may impact timelines within the organization
B. The ability of the third party to respond to the organization in a timely manner and with accurate information
C. The effects of transborder data flows and customer expectations regarding the storage or processing of their data
D. The quantity of data that must be provided to the third party and how it is to be used
Answer: C
An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other
necessary components to have an effective security program. There are numerous initiatives requiring security involvement.
The effectiveness of the security program can PRIMARILY be measured through
A. audit findings.
B. risk elimination.
C. audit requirements.
D. customer satisfaction.
Answer: A
Answer: D
A. Knurling
B. Grinding
C. Shredding
D. Degaussing
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Authorization
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
Answer: B
Answer: A
A. Negative testing
B. White box testing
C. Penetration testing
D. Black box testing
Answer: B
Answer: D
Answer: B
Answer: A
A. The remaining photons left in a fiber optic cable after a secure transmission.
B. The retention period required by law or regulation.
C. The magnetic flux created when removing the network connection from a server or personal computer.
D. The residual information left on magnetic storage media after a deletion or erasure.
Answer: D
Answer: C
Answer: B
Answer: D
Answer: A
Answer: A
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: A
Answer: A
A. External
B. Overt
C. Internal
D. Covert
Answer: D
Answer: B
Answer: A
Answer: D
Answer: A
Answer: B
Answer: B
Answer: B
Answer: A
Answer: A
A. dig
B. ifconfig
C. ipconfig
D. nbtstat
Answer: A
Answer: C
A. After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.
B. After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.
C. The firewall rules are backed up to an air-gapped system.
D. A baseline configuration is created and maintained for all relevant systems.
Answer: D
Answer: C
Answer: B
Answer: B
Answer: A
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Federation
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
Answer: C
Answer: B
A. data at rest.
B. the source IP address.
C. data transmitted.
D. data availability.
Answer: C
Answer: C
A. Two-factor authentication
B. Single Sign-On (SSO)
C. User self-service
D. A metadirectory
Answer: C
A. IEEE 802.1F
B. IEEE 802.1H
C. IEEE 802.1Q
D. IEEE 802.1X
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: C
Answer: C
Answer: B
A. Integrity
B. Confidentiality
C. Availability
D. Access Control
Answer: A
Answer: B
A. An access token
B. A username and password
C. A username
D. A password
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: D
Answer: D
Answer: B
A. Parallel
B. Walkthrough
C. Simulation
D. Tabletop
Answer: C
Answer: B
Answer: A
Answer:
Answer: C
Answer: A
Answer: C
Answer: C
Answer: B
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
LAN 4
Answer: B
Answer: C
Answer: D
Answer: C
Answer: B
A. Media marking refers to the use of human-readable security attributes, while media labeling refers to the use of security attributes in internal data structures.
B. Media labeling refers to the use of human-readable security attributes, while media marking refers to the use of security attributes in internal data structures.
C. Media labeling refers to security attributes required by public policy/law, while media marking refers to security required by internal organizational policy.
D. Media marking refers to security attributes required by public policy/law, while media labeling refers to security attributes required by internal organizational
policy.
Answer: D
Answer: C
A. User awareness
B. Two-factor authentication
C. Anti-phishing software
D. Periodic vulnerability scan
Answer: A
Answer: A
Answer: A
A. Transference
B. Covert channel
C. Bleeding
D. Cross-talk
Answer: D
Answer: B
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Look-up secret token - A physical or electronic token that stores a set of secrets between the claimant and the credential service provider
Out-of-Band Token - A physical token that is uniquely addressable and can receive a verifier-selected secret for one-time use
Pre-registered Knowledge Token - A series of responses to a set of prompts or challenges established by the subscriber and credential service provider during the
registration process
Memorized Secret Token - A secret shared between the subscriber and credential service provider that is typically character strings
A. organization policy.
B. industry best practices.
C. industry laws and regulations.
D. management feedback.
Answer: A
Answer: B
A. Property book
B. Chain of custody form
C. Search warrant return
D. Evidence tag
Answer: D
A. Reversal
B. Gray box
C. Blind
D. White box
Answer: B
Answer: B
Answer: B
Answer: A
Answer: C
Answer: A
A. Data custodian
B. Information owner
C. Database administrator
D. Quality control
Answer: A
A. Transport Layer
B. Data-Link Layer
C. Network Layer
D. Application Layer
Answer: C
Answer: C
Answer: D
Answer: B
Answer: C
Answer: D
A. VPN bandwidth
B. Simultaneous connection to other networks
C. Users with Internet Protocol (IP) addressing conflicts
D. Remote users with administrative rights
Answer: B
Answer: C
Answer: B
Answer: C
A. systems integration.
B. risk management.
C. quality assurance.
D. change management.
Answer: D
Answer: D
Answer: C
A. Ownership
B. Confidentiality
C. Availability
D. Integrity
Answer: C
Answer: B
A. Operating system and version, patch level, applications running, and versions.
B. List of system changes, test reports, and change approvals
C. Last vulnerability assessment report and initial risk assessment report
D. Date of last update, test report, and accreditation certificate
Answer: A
When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4), where is the GRE header inserted?
Answer: B
Answer: B
Answer: C
Answer: C
A. Alert data
B. User data
C. Content data
D. Statistical data
Answer: D
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: D
A. Purpose
B. Cost effectiveness
C. Availability
D. Authenticity
Answer: D
A. Notification tool
B. Message queuing tool
C. Security token tool
D. Synchronization tool
Answer: C
Answer: B
A. SSL and TLS provide a generic channel security mechanism on top of Transmission Control Protocol (TCP).
B. SSL and TLS provide nonrepudiation by default.
C. SSL and TLS do not provide security for most routed protocols.
D. SSL and TLS provide header encapsulation over HyperText Transfer Protocol (HTTP).
Answer: A
Answer: B
A. 25%
B. 50%
C. 75%
D. 100%
Answer: A
Answer: C
Answer: B
Answer: A
Answer: C
Explanation:
Section: Security Operations
A. Stateful firewall
B. Distributed antivirus
C. Log analysis
D. Passive honeypot
Answer: A
A. To ensure Information Technology (IT) staff knows and performs roles assigned to each of them
B. To validate backup sites’ effectiveness
C. To find out what does not work and fix it
D. To create a high level DRP awareness among Information Technology (IT) staff
Answer: B
Answer: A
Answer: A
Answer: A
Answer: B
A. Application authentication
B. Input validation
C. Digital signing
D. Device encryption
Answer: C
A. Large mantrap where groups of individuals leaving are identified using facial recognition technology
B. Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor
C. Emergency exits with push bars with coordinates at each exit checking off the individual against a predefined list
D. Card-activated turnstile where individuals are validated upon exit
Answer: B
Explanation:
Section: Security Operations
A. Biba
B. Graham-Denning
C. Clark-Wilson
D. Beil-LaPadula
Answer: C
A. Purging
B. Encryption
C. Destruction
D. Clearing
Answer: A
A. Countermeasure effectiveness
B. Type of potential loss
C. Incident likelihood
D. Information ownership
Answer:
Answer: D
A. Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
B. Disable the broadcast of the Service Set Identifier (SSID) name
C. Change the name of the Service Set Identifier (SSID) to a random value not associated with theorganization
D. Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
Answer: D
A. The IDS can detect failed administrator logon attempts from servers.
B. The IDS can increase the number of packets to analyze.
C. The firewall can increase the number of packets to analyze.
D. The firewall can detect failed administrator login attempts from servers
Answer: A
Answer: A
Answer: C
Answer: A
Answer: A
Explanation:
Section: Security Operations
A. Ensure that users and personnel complete the required security training to access the Information System (IS)
B. Defining proper access to the Information System (IS), including privileges or access rights
C. Managing identification, implementation, and assessment of common security controls
D. Ensuring the Information System (IS) is operated according to agreed upon security requirements
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
About Exambible
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA,
CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the
candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have
got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could
not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another
exam of your claim, ABSOLUTELY FREE!
NEW QUESTION 1
- (Exam Topic 1)
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?
Answer: C
NEW QUESTION 2
- (Exam Topic 1)
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that
Answer: B
NEW QUESTION 3
- (Exam Topic 1)
Which of the following actions will reduce risk to a laptop before traveling to a high risk area?
Answer: D
NEW QUESTION 4
- (Exam Topic 1)
Intellectual property rights are PRIMARY concerned with which of the following?
Answer: D
NEW QUESTION 5
- (Exam Topic 1)
What is the MOST important consideration from a data security perspective when an organization plans to relocate?
A. Ensure the fire prevention and detection systems are sufficient to protect personnel
B. Review the architectural plans to determine how many emergency exits are present
C. Conduct a gap analysis of a new facilities against existing security requirements
D. Revise the Disaster Recovery and Business Continuity (DR/BC) plan
Answer: C
NEW QUESTION 6
- (Exam Topic 2)
Which of the following is an initial consideration when developing an information security management system?
Answer: B
NEW QUESTION 7
- (Exam Topic 2)
Which of the following is MOST important when assigning ownership of an asset to a department?
Answer: B
NEW QUESTION 8
- (Exam Topic 2)
Which of the following BEST describes the responsibilities of a data owner?
A. Ensuring quality and validation through periodic audits for ongoing data integrity
B. Maintaining fundamental data availability, including data storage and archiving
C. Ensuring accessibility to appropriate users, maintaining appropriate levels of data security
D. Determining the impact the information has on the mission of the organization
Answer: C
NEW QUESTION 9
- (Exam Topic 3)
Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified
automated vulnerability assessments?
Answer: B
NEW QUESTION 10
- (Exam Topic 3)
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?
Answer: A
NEW QUESTION 10
- (Exam Topic 3)
The use of private and public encryption keys is fundamental in the implementation of which of the following?
A. Diffie-Hellman algorithm
B. Secure Sockets Layer (SSL)
C. Advanced Encryption Standard (AES)
D. Message Digest 5 (MD5)
Answer: A
NEW QUESTION 15
- (Exam Topic 3)
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
A. Implementation Phase
B. Initialization Phase
C. Cancellation Phase
D. Issued Phase
Answer: D
NEW QUESTION 17
- (Exam Topic 4)
An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly
implement a control?
Answer: A
NEW QUESTION 21
- (Exam Topic 4)
An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the
MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?
Answer: D
NEW QUESTION 25
- (Exam Topic 4)
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
Answer: A
NEW QUESTION 28
- (Exam Topic 5)
Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual
employee’s salary?
Answer: C
NEW QUESTION 31
- (Exam Topic 5)
Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile
devices?
A. Derived credential
B. Temporary security credential
C. Mobile device credentialing service
D. Digest authentication
Answer: A
NEW QUESTION 33
- (Exam Topic 6)
Which of the following could cause a Denial of Service (DoS) against an authentication system?
Answer: D
NEW QUESTION 35
- (Exam Topic 6)
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s
access to data files?
Answer: A
NEW QUESTION 38
- (Exam Topic 6)
Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?
A. Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken
B. Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability
C. Management teams will understand the testing objectives and reputational risk to the organization
D. Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels
Answer: D
NEW QUESTION 42
- (Exam Topic 7)
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24
hours?
A. Warm site
B. Hot site
C. Mirror site
D. Cold site
Answer: A
NEW QUESTION 46
- (Exam Topic 7)
Which of the following is a PRIMARY advantage of using a third-party identity service?
Answer: D
NEW QUESTION 51
- (Exam Topic 7)
What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?
Answer: D
NEW QUESTION 55
- (Exam Topic 7)
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST
probable cause?
Answer: D
NEW QUESTION 60
- (Exam Topic 7)
With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?
Answer: B
NEW QUESTION 65
- (Exam Topic 7)
When is a Business Continuity Plan (BCP) considered to be valid?
Answer: D
NEW QUESTION 68
- (Exam Topic 7)
What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?
Answer: C
NEW QUESTION 71
- (Exam Topic 7)
Which of the following is the FIRST step in the incident response process?
Answer: D
NEW QUESTION 73
- (Exam Topic 8)
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
A. After the system preliminary design has been developed and the data security categorization has been performed
B. After the vulnerability analysis has been performed and before the system detailed design begins
C. After the system preliminary design has been developed and before the data security categorization begins
D. After the business functional analysis and the data security categorization have been performed
Answer: C
NEW QUESTION 75
- (Exam Topic 8)
What is the BEST approach to addressing security issues in legacy web applications?
Answer: D
NEW QUESTION 76
- (Exam Topic 8)
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?
Answer: D
NEW QUESTION 77
- (Exam Topic 9)
What is the FIRST step in developing a security test and its evaluation?
Answer: C
NEW QUESTION 82
- (Exam Topic 9)
Which of the following is ensured when hashing files during chain of custody handling?
A. Availability
B. Accountability
C. Integrity
D. Non-repudiation
Answer: C
NEW QUESTION 86
- (Exam Topic 9)
Logical access control programs are MOST effective when they are
Answer: D
NEW QUESTION 88
- (Exam Topic 9)
A vulnerability test on an Information System (IS) is conducted to
Answer: C
NEW QUESTION 89
- (Exam Topic 9)
In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?
A. Communication
B. Planning
C. Recovery
D. Escalation
Answer: A
NEW QUESTION 92
- (Exam Topic 9)
An internal Service Level Agreement (SLA) covering security is signed by senior managers and is in place. When should compliance to the SLA be reviewed to
ensure that a good security posture is being delivered?
Answer: D
NEW QUESTION 93
- (Exam Topic 9)
Why is a system's criticality classification important in large organizations?
A. It provides for proper prioritization and scheduling of security and maintenance tasks.
B. It reduces critical system support workload and reduces the time required to apply patches.
C. It allows for clear systems status communications to executive management.
D. It provides for easier determination of ownership, reducing confusion as to the status of the asset.
Answer: A
NEW QUESTION 98
- (Exam Topic 9)
Which one of the following transmission media is MOST effective in preventing data interception?
A. Microwave
B. Twisted-pair
C. Fiber optic
D. Coaxial cable
Answer: C
A. Physical
B. Session
C. Transport
D. Data-Link
Answer: C
approaches?
Answer: D
Answer: A
A. control.
B. permission.
C. procedure.
D. protocol.
Answer: B
A. Network availability
B. Data integrity
C. Network bandwidth
D. Node locations
Answer: C
A. Spam filtering
B. Cryptographic signature
C. Uniform Resource Locator (URL) filtering
D. Reverse Domain Name Service (DNS) lookup
Answer: B
Answer: D
A. Vulnerability to crime
B. Adjacent buildings and businesses
C. Proximity to an airline flight path
D. Vulnerability to natural disasters
Answer: C
- (Exam Topic 9)
Multi-threaded applications are more at risk than single-threaded applications to
A. race conditions.
B. virus infection.
C. packet sniffing.
D. database injection.
Answer: A
Answer: D
Answer: A
Answer: B
Answer: B
Answer: A
A. Job rotation
B. Separation of duties
C. Least privilege model
D. Increased monitoring
Answer: B
Answer: D
Answer: C
Answer: A
Answer: C
Answer: A
Answer: A
A. The service provider's policies are consistent with ISO/IEC27001 and there is evidence that the service provider is following those policies.
B. The service provider will segregate the data within its systems and ensure that each region's policies are met.
C. The service provider will impose controls and protections that meet or exceed the current systemscontrols and produce audit logs as verification.
D. The service provider's policies can meet the requirements imposed by the new environment even if they differ from the organization's current policies.
Answer: D
A. Determining the probability that the system functions safely during any time period
B. Quantifying the system's available services
C. Identifying the number of security flaws within the system
D. Measuring the system's integrity in the presence of failure
Answer: C
Answer: D
Answer: D
A. Cryptographic checksums
B. Version numbering
C. Automatic updates
D. Vendor assurance
Answer: A
Answer: D
Answer: A
D. Address Masking
Answer: A
Answer: C
Answer: B
A. system software.
B. system hardware.
C. application software.
D. network hardware.
Answer: A
Answer: C
Answer: B
Answer: A
A. Detection
B. Prevention
C. Investigation
D. Correction
Answer: A
Answer: C
Answer: D
A. Exceed the threshold limit of the connection queue for a given service
B. Set the threshold to zero for a given service
C. Cause the buffer to overflow, allowing root access
D. Flush the register stack, allowing hijacking of the root account
Answer: A
A. Trusted path
B. Malicious logic
C. Social engineering
D. Passive misuse
Answer: C
Answer: B
Answer: A
- (Exam Topic 9)
What maintenance activity is responsible for defining, implementing, and testing updates to application systems?
Answer: A
A. Technical management
B. Change control board
C. System operations
D. System users
Answer: B
A. A dictionary attack
B. A Denial of Service (DoS) attack
C. A spoofing attack
D. A backdoor installation
Answer: A
Answer: C
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: B
A. Show the need for security; identify the message and the audience
B. Ensure that the security presentation is designed to be all-inclusive
C. Notify them that their compliance is mandatory
D. Explain how hackers have enhanced information security
Answer: A
A. Sandbox
B. Change control
C. Memory management
D. Public-Key Infrastructure (PKI)
Answer: A
Answer: B
A. Disassembly, analysis, or reverse engineering will reveal the security functionality of the computer system.
B. Algorithms must be protected to ensure the security and interoperability of the designed system.
C. A knowledgeable user should have limited privileges on the system to prevent their ability to compromise security capabilities.
D. The security of a mechanism should not depend on the secrecy of its design or implementation.
Answer: D
Answer: C
Answer: B
A. Non-repudiation
B. Traceability
C. Anonymity
D. Resilience
Answer: C
A. Requirements Analysis
B. Development and Deployment
C. Production Operations
D. Utilization Support
Answer: A
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Backup Media
Reference: Official (ISC)2 Guide to the CISSP CBK, Third Edition page 1029
Answer: B
Answer: C
A. Audit policy
B. Security log
C. Security policies
D. Configuration settings
Answer: C
Answer: B
Answer: C
A. Inadequate IT support
B. Loss of data and separation of duties
C. Undocumented security controls
D. Additional responsibilities for remaining staff
Answer: B
A. default gateway.
B. attacker's address.
C. local interface being attacked.
D. specified source address.
Answer: D
Answer: A
A. 802.11i
B. Kerberos
C. Lightweight Directory Access Protocol (LDAP)
D. Security Assertion Markup Language (SAML)
Answer: D
Answer: D
Answer: C
Answer: A
A. Two-factor authentication
B. Digital certificates and hardware tokens
C. Timed sessions and Secure Socket Layer (SSL)
D. Passwords with alpha-numeric and special characters
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
D. Associated clearance
Answer: A
Answer: B
A. An initialization check
B. An identification check
C. An authentication check
D. An authorization check
Answer: C
Answer: C
A. System integrity
B. System availability
C. System confidentiality
D. System auditability
Answer: B
Answer: B
Answer: D
Answer: D
Answer: C
A. User A
B. User B
C. User C
D. User D
Answer: D
Answer: B
A. Information security
B. Departmental management
C. Data custodian
D. Data owner
Answer: D
Answer: C
A. least privilege.
B. rule based access controls.
C. Mandatory Access Control (MAC).
D. separation of duties.
Answer: D
Answer: B
A. Security procedures
B. Security standards
C. Human resource policy
D. Human resource standards
Answer: B
Answer: B
A. Severity of risk
B. Complexity of strategy
C. Frequency of incidents
D. Ongoing awareness
Answer: A
Answer: A
A. Least privilege
B. Lattice Based Access Control (LBAC)
C. Role Based Access Control (RBAC)
D. Lightweight Directory Access Control (LDAP)
Answer: C
Answer: D
Answer: B
Answer: C
A. Provide students with Internet Protocol Security (IPSec) Virtual Private Network (VPN) client software.
B. Use Secure Sockets Layer (SSL) VPN technology.
C. Use Secure Shell (SSH) with public/private keys.
D. Require students to purchase home router capable of VPN.
Answer: B
In a Bell-LaPadula system, which user has the MOST restrictions when writing data to any of the four files?
A. User A
B. User B
C. User C
D. User D
Answer: D
A. Commercial products often have serious weaknesses of the magnetic force available in the degausser product.
B. Degausser products may not be properly maintained and operated.
C. The inability to turn the drive around in the chamber for the second pass due to human error.
D. Inadequate record keeping when sanitizing mediA.
Answer: B
A. Timing
B. Cold boot
C. Side channel
D. Acoustic cryptanalysis
Answer: B
Answer: D
A. application dismissal.
B. business procedures.
C. digital certificates expiration.
D. regulatory compliance.
Answer: D
Answer: B
A. Brute force
B. Tampering
C. Information disclosure
D. Denial of Service (DoS)
Answer: C
Answer: B
Answer: B
Answer: B
Answer: C
A. The organizational structure of the third party and how it may impact timelines within the organization
B. The ability of the third party to respond to the organization in a timely manner and with accurate information
C. The effects of transborder data flows and customer expectations regarding the storage or processing of their data
D. The quantity of data that must be provided to the third party and how it is to be used
Answer: C
An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other
necessary components to have an effective security program. There are numerous initiatives requiring security involvement.
The effectiveness of the security program can PRIMARILY be measured through
A. audit findings.
B. risk elimination.
C. audit requirements.
D. customer satisfaction.
Answer: A
Answer: D
A. Knurling
B. Grinding
C. Shredding
D. Degaussing
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Authorization
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
Answer: B
Answer: A
A. Negative testing
B. White box testing
C. Penetration testing
D. Black box testing
Answer: B
Answer: D
Answer: B
Answer: A
A. The remaining photons left in a fiber optic cable after a secure transmission.
B. The retention period required by law or regulation.
C. The magnetic flux created when removing the network connection from a server or personal computer.
D. The residual information left on magnetic storage media after a deletion or erasure.
Answer: D
Answer: C
Answer: B
Answer: D
Answer: A
Answer: A
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: A
Answer: A
A. External
B. Overt
C. Internal
D. Covert
Answer: D
Answer: B
Answer: A
Answer: D
Answer: A
Answer: B
Answer: B
Answer: B
Answer: A
Answer: A
A. dig
B. ifconfig
C. ipconfig
D. nbtstat
Answer: A
Answer: C
A. After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.
B. After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.
C. The firewall rules are backed up to an air-gapped system.
D. A baseline configuration is created and maintained for all relevant systems.
Answer: D
Answer: C
Answer: B
Answer: B
Answer: A
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Federation
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
Answer: C
Answer: B
A. data at rest.
B. the source IP address.
C. data transmitted.
D. data availability.
Answer: C
Answer: C
A. Two-factor authentication
B. Single Sign-On (SSO)
C. User self-service
D. A metadirectory
Answer: C
A. IEEE 802.1F
B. IEEE 802.1H
C. IEEE 802.1Q
D. IEEE 802.1X
Answer: D
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: C
Answer: C
Answer: B
A. Integrity
B. Confidentiality
C. Availability
D. Access Control
Answer: A
Answer: B
A. An access token
B. A username and password
C. A username
D. A password
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: D
Answer: D
Answer: B
A. Parallel
B. Walkthrough
C. Simulation
D. Tabletop
Answer: C
Answer: B
Answer: A
Answer:
Answer: C
Answer: A
Answer: C
Answer: C
Answer: B
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
LAN 4
Answer: B
Answer: C
Answer: D
Answer: C
Answer: B
A. Media marking refers to the use of human-readable security attributes, while media labeling refers to the use of security attributes in internal data structures.
B. Media labeling refers to the use of human-readable security attributes, while media marking refers to the use of security attributes in internal data structures.
C. Media labeling refers to security attributes required by public policy/law, while media marking refers to security required by internal organizational policy.
D. Media marking refers to security attributes required by public policy/law, while media labeling refers to security attributes required by internal organizational
policy.
Answer: D
Answer: C
A. User awareness
B. Two-factor authentication
C. Anti-phishing software
D. Periodic vulnerability scan
Answer: A
Answer: A
Answer: A
A. Transference
B. Covert channel
C. Bleeding
D. Cross-talk
Answer: D
Answer: B
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Look-up secret token - A physical or electronic token that stores a set of secrets between the claimant and the credential service provider
Out-of-Band Token - A physical token that is uniquely addressable and can receive a verifier-selected secret for one-time use
Pre-registered Knowledge Token - A series of responses to a set of prompts or challenges established by the subscriber and credential service provider during the
registration process
Memorized Secret Token - A secret shared between the subscriber and credential service provider that is typically character strings
A. organization policy.
B. industry best practices.
C. industry laws and regulations.
D. management feedback.
Answer: A
Answer: B
A. Property book
B. Chain of custody form
C. Search warrant return
D. Evidence tag
Answer: D
A. Reversal
B. Gray box
C. Blind
D. White box
Answer: B
Answer: B
Answer: B
Answer: A
Answer: C
Answer: A
A. Data custodian
B. Information owner
C. Database administrator
D. Quality control
Answer: A
A. Transport Layer
B. Data-Link Layer
C. Network Layer
D. Application Layer
Answer: C
Answer: C
Answer: D
Answer: B
Answer: C
Answer: D
A. VPN bandwidth
B. Simultaneous connection to other networks
C. Users with Internet Protocol (IP) addressing conflicts
D. Remote users with administrative rights
Answer: B
Answer: C
Answer: B
Answer: C
A. systems integration.
B. risk management.
C. quality assurance.
D. change management.
Answer: D
Answer: D
Answer: C
A. Ownership
B. Confidentiality
C. Availability
D. Integrity
Answer: C
Answer: B
A. Operating system and version, patch level, applications running, and versions.
B. List of system changes, test reports, and change approvals
C. Last vulnerability assessment report and initial risk assessment report
D. Date of last update, test report, and accreditation certificate
Answer: A
When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4), where is the GRE header inserted?
Answer: B
Answer: B
Answer: C
Answer: C
A. Alert data
B. User data
C. Content data
D. Statistical data
Answer: D
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: D
A. Purpose
B. Cost effectiveness
C. Availability
D. Authenticity
Answer: D
A. Notification tool
B. Message queuing tool
C. Security token tool
D. Synchronization tool
Answer: C
Answer: B
A. SSL and TLS provide a generic channel security mechanism on top of Transmission Control Protocol (TCP).
B. SSL and TLS provide nonrepudiation by default.
C. SSL and TLS do not provide security for most routed protocols.
D. SSL and TLS provide header encapsulation over HyperText Transfer Protocol (HTTP).
Answer: A
Answer: B
A. 25%
B. 50%
C. 75%
D. 100%
Answer: A
Answer: C
Answer: B
Answer: A
Answer: C
Explanation:
Section: Security Operations
A. Stateful firewall
B. Distributed antivirus
C. Log analysis
D. Passive honeypot
Answer: A
A. To ensure Information Technology (IT) staff knows and performs roles assigned to each of them
B. To validate backup sites’ effectiveness
C. To find out what does not work and fix it
D. To create a high level DRP awareness among Information Technology (IT) staff
Answer: B
Answer: A
Answer: A
Answer: A
Answer: B
A. Application authentication
B. Input validation
C. Digital signing
D. Device encryption
Answer: C
A. Large mantrap where groups of individuals leaving are identified using facial recognition technology
B. Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor
C. Emergency exits with push bars with coordinates at each exit checking off the individual against a predefined list
D. Card-activated turnstile where individuals are validated upon exit
Answer: B
Explanation:
Section: Security Operations
A. Biba
B. Graham-Denning
C. Clark-Wilson
D. Beil-LaPadula
Answer: C
A. Purging
B. Encryption
C. Destruction
D. Clearing
Answer: A
A. Countermeasure effectiveness
B. Type of potential loss
C. Incident likelihood
D. Information ownership
Answer:
Answer: D
A. Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
B. Disable the broadcast of the Service Set Identifier (SSID) name
C. Change the name of the Service Set Identifier (SSID) to a random value not associated with theorganization
D. Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
Answer: D
A. The IDS can detect failed administrator logon attempts from servers.
B. The IDS can increase the number of packets to analyze.
C. The firewall can increase the number of packets to analyze.
D. The firewall can detect failed administrator login attempts from servers
Answer: A
Answer: A
Answer: C
Answer: A
Answer: A
Explanation:
Section: Security Operations
A. Ensure that users and personnel complete the required security training to access the Information System (IS)
B. Defining proper access to the Information System (IS), including privileges or access rights
C. Managing identification, implementation, and assessment of common security controls
D. Ensuring the Information System (IS) is operated according to agreed upon security requirements
Answer: C
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Relate Links
https://www.exambible.com/CISSP-exam/
Contact us
We are proud of our high-quality customer service, which serves you around the clock 24/7.
Viste - https://www.exambible.com/