Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Information Systems Security Professional (CISSP)

Last Update 13 hours ago Total Questions : 1485

The Certified Information Systems Security Professional (CISSP) content is now fully updated, with all current exam questions added 13 hours ago. Deciding to include CISSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CISSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CISSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Information Systems Security Professional (CISSP) practice test comfortably within the allotted time.

Question # 16

The use of private and public encryption keys is fundamental in the implementation of which of the following?

A.

Diffie-Hellman algorithm

B.

Secure Sockets Layer (SSL)

C.

Advanced Encryption Standard (AES)

D.

Message Digest 5 (MD5)

Question # 17

Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?

A.

Confidentiality

B.

Integrity

C.

Identification

D.

Availability

Question # 18

A Simple Power Analysis (SPA) attack against a device directly observes which of the following?

A.

Static discharge

B.

Consumption

C.

Generation

D.

Magnetism

Question # 19

What should happen when an emergency change to a system must be performed?

A.

The change must be given priority at the next meeting of the change control board.

B.

Testing and approvals must be performed quickly.

C.

The change must be performed immediately and then submitted to the change board.

D.

The change is performed and a notation is made in the system log.

Question # 20

Which of the following standards/guidelines requires an Information Security Management System (ISMS) to be defined?

A.

International Organization for Standardization (ISO) 27000 family

B.

Information Technology Infrastructure Library (ITIL)

C.

Payment Card Industry Data Security Standard (PCIDSS)

D.

ISO/IEC 20000

Question # 21

The application of a security patch to a product previously validate at Common Criteria (CC) Evaluation Assurance Level (EAL) 4 would

A.

require an update of the Protection Profile (PP).

B.

require recertification.

C.

retain its current EAL rating.

D.

reduce the product to EAL 3.

Question # 22

When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4), where is the GRE header inserted?

A.

Into the options field

B.

Between the delivery header and payload

C.

Between the source and destination addresses

D.

Into the destination address

Question # 23

Which of the following are effective countermeasures against passive network-layer attacks?

A.

Federated security and authenticated access controls

B.

Trusted software development and run time integrity controls

C.

Encryption and security enabled applications

D.

Enclave boundary protection and computing environment defense

Question # 24

When constructing an Information Protection Policy (IPP), it is important that the stated rules are necessary, adequate, and

A.

flexible.

B.

confidential.

C.

focused.

D.

achievable.

Question # 25

A practice that permits the owner of a data object to grant other users access to that object would usually provide

A.

Mandatory Access Control (MAC).

B.

owner-administered control.

C.

owner-dependent access control.

D.

Discretionary Access Control (DAC).

Question # 26

Which methodology is recommended for penetration testing to be effective in the development phase of the life-cycle process?

A.

White-box testing

B.

Software fuzz testing

C.

Black-box testing

D.

Visual testing

Question # 27

Which of the following is BEST suited for exchanging authentication and authorization messages in a multi-party decentralized environment?

A.

Lightweight Directory Access Protocol (LDAP)

B.

Security Assertion Markup Language (SAML)

C.

Internet Mail Access Protocol

D.

Transport Layer Security (TLS)

Question # 28

Reciprocal backup site agreements are considered to be

A.

a better alternative than the use of warm sites.

B.

difficult to test for complex systems.

C.

easy to implement for similar types of organizations.

D.

easy to test and implement for complex systems.

Question # 29

In order for a security policy to be effective within an organization, it MUST include

A.

strong statements that clearly define the problem.

B.

a list of all standards that apply to the policy.

C.

owner information and date of last revision.

D.

disciplinary measures for non compliance.

Question # 30

Who in the organization is accountable for classification of data information assets?

A.

Data owner

B.

Data architect

C.

Chief Information Security Officer (CISO)

D.

Chief Information Officer (CIO)

Go to page: