Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Information Systems Security Professional (CISSP)

Last Update 14 hours ago Total Questions : 1485

The Certified Information Systems Security Professional (CISSP) content is now fully updated, with all current exam questions added 14 hours ago. Deciding to include CISSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CISSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CISSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Information Systems Security Professional (CISSP) practice test comfortably within the allotted time.

Question # 151

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?

A.

Intrusion Prevention Systems (IPS)

B.

Intrusion Detection Systems (IDS)

C.

Stateful firewalls

D.

Network Behavior Analysis (NBA) tools

Question # 152

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

A.

Link layer

B.

Physical layer

C.

Session layer

D.

Application layer

Question # 153

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

A.

Implement packet filtering on the network firewalls

B.

Install Host Based Intrusion Detection Systems (HIDS)

C.

Require strong authentication for administrators

D.

Implement logical network segmentation at the switches

Question # 154

In the last 15 years a company has experienced three electrical failures. The cost associated with each failure is listed below.

Which of the following would be a reasonable annual loss expectation?

A.

140,000

B.

3,500

C.

350,000

D.

14,000

Question # 155

In a dispersed network that lacks central control, which of the following is die PRIMARY course of action to mitigate exposure?

A.

Implement management policies, audit control, and data backups

B.

Implement security policies and standards, access controls, and access limitations

C.

Implement security policies and standards, data backups, and audit controls

D.

Implement remote access policies, shared workstations, and log management

Question # 156

What is the MOST effective way to determine a mission critical asset in an organization?

A.

Vulnerability analysis

B.

business process analysis

C.

Threat analysis

D.

Business risk analysis

Question # 157

The security team has been tasked with performing an interface test against a frontend external facing application and needs to verify that all input fields protect against

invalid input. Which of the following BEST assists this process?

A.

Application fuzzing

B.

Instruction set simulation

C.

Regression testing

D.

Sanity testing

Question # 158

What is the MOST important goal of conducting security assessments?

A.

To prepare the organization for an external audit, particularly by a regulatory entity

B.

To discover unmitigated security vulnerabilities, and propose paths for mitigating them

C.

To align the security program with organizational risk appetite

D.

To demonstrate proper function of security controls and processes to senior management

Question # 159

Which of the following is mobile device remote fingerprinting?

A.

Installing an application to retrieve common characteristics of the device

B.

Storing information about a remote device in a cookie file

C.

Identifying a device based on common characteristics shared by all devices of a certain type

D.

Retrieving the serial number of the mobile device

Question # 160

Which of the following is the key requirement for test results when implementing forensic procedures?

A.

The test results must be cost-effective.

B.

The test result must be authorized.

C.

The test results must be quantifiable.

D.

The test results must be reproducible.

Question # 161

Which of the following problems is not addressed by using OAuth (Open Standard to Authorization) 2.0 to integrate a third-party identity provider for a service?

A.

Resource Servers are required to use passwords to authenticate end users.

B.

Revocation of access of some users of the third party instead of all the users from the third party.

C.

Compromise of the third party means compromise of all the users in the service.

D.

Guest users need to authenticate with the third party identity provider.

Question # 162

A thorough review of an organization ' s audit logs finds that a disgruntled network administrator has intercepted emails meant for the Chief Executive Officer (CEO) and changed them before forwarding them to their intended recipient. What type of attack has MOST likely occurred?

A.

Spoofing

B.

Eavesdropping

C.

Man-in-the-middle

D.

Denial of service

Question # 163

Which of the following is a process within a Systems Engineering Life Cycle (SELC) stage?

A.

Requirements Analysis

B.

Development and Deployment

C.

Production Operations

D.

Utilization Support

Question # 164

Which of the following secure startup mechanisms are PRIMARILY designed to thwart attacks?

A.

Timing

B.

Cold boot

C.

Side channel

D.

Acoustic cryptanalysis

Question # 165

With data labeling, which of the following MUST be the key decision maker?

A.

Information security

B.

Departmental management

C.

Data custodian

D.

Data owner

Go to page: