Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Information Systems Security Professional (CISSP)

Last Update 13 hours ago Total Questions : 1485

The Certified Information Systems Security Professional (CISSP) content is now fully updated, with all current exam questions added 13 hours ago. Deciding to include CISSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CISSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CISSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Information Systems Security Professional (CISSP) practice test comfortably within the allotted time.

Question # 46

Information Security Continuous Monitoring (1SCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management

decisions. Which of the following is the FIRST step in developing an ISCM strategy and implementing an ISCM program?

A.

Define a strategy based on risk tolerance that maintains clear visibility into assets, awareness of vulnerabilities, up-to-date threat information, and mission/business impacts.

B.

Conduct a vulnerability assessment to discover current threats against the environment and incorporate them into the program.

C.

Respond to findings with technical management, and operational mitigating activities or acceptance, transference/sharing, or avoidance/rejection.

D.

Analyze the data collected and report findings, determining the appropriate response. It may be necessary to collect additional information to clarify or supplement existing monitoring data.

Question # 47

Which of the following measures serves as the BEST means for protecting data on computers, smartphones, and external storage devices when traveling to high-risk countries?

A.

Review applicable destination country laws, forensically clean devices prior to travel, and only download sensitive data over a virtual private network (VPN) upon arriving at the destination.

B.

Keep laptops, external storage devices, and smartphones in the hotel room when not in use.

C.

Leverage a Secure Socket Layer (SSL) connection over a virtual private network (VPN) to download sensitive data upon arriving at the destination.

D.

Use multi-factor authentication (MFA) to gain access to data stored on laptops or external storage devices and biometric fingerprint access control isms to unlock smartphones.

Question # 48

Additional padding may be added to the Encapsulating security protocol (ESP) trailer to provide which of the following?

A.

Data origin authentication

B.

Partial traffic flow confidentiality

C.

protection ao > ainst replay attack

D.

Access control

Question # 49

Which of the following would BEST describe the role directly responsible for data within an organization?

A.

Data custodian

B.

Information owner

C.

Database administrator

D.

Quality control

Question # 50

Which of the following is a weakness of Wired Equivalent Privacy (WEP)?

A.

Length of Initialization Vector (IV)

B.

Protection against message replay

C.

Detection of message tampering

D.

Built-in provision to rotate keys

Question # 51

In order to assure authenticity, which of the following are required?

A.

Confidentiality and authentication

B.

Confidentiality and integrity

C.

Authentication and non-repudiation

D.

Integrity and non-repudiation

Question # 52

Which of the following sets of controls should allow an investigation if an attack is not blocked by preventive controls or detected by monitoring?

A.

Logging and audit trail controls to enable forensic analysis

B.

Security incident response lessons learned procedures

C.

Security event alert triage done by analysts using a Security Information and Event Management (SIEM) system

D.

Transactional controls focused on fraud prevention

Question # 53

An organization has decided to contract with a cloud-based service provider to leverage their identity as a service offering. They will use Open Authentication (OAuth) 2.0 to authenticate external users to the organization ' s services.

As part of the authentication process, which of the following must the end user provide?

A.

An access token

B.

A username and password

C.

A username

D.

A password

Question # 54

While inventorying storage equipment, it is found that there are unlabeled, disconnected, and powered off devices. Which of the following is the correct procedure for handling such equipment?

A.

They should be recycled to save energy.

B.

They should be recycled according to NIST SP 800-88.

C.

They should be inspected and sanitized following the organizational policy.

D.

They should be inspected and categorized properly to sell them for reuse.

Question # 55

Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that system and trigger a recertification activity are documented in the

A.

security impact analysis.

B.

structured code review.

C.

routine self assessment.

D.

cost benefit analysis.

Question # 56

Which of the following is the BEST method to assess the effectiveness of an organization ' s vulnerability management program?

A.

Review automated patch deployment reports

B.

Periodic third party vulnerability assessment

C.

Automated vulnerability scanning

D.

Perform vulnerability scan by security team

Question # 57

While investigating a malicious event, only six days of audit logs from the last month were available. What policy should be updated to address this problem?

A.

Retention

B.

Reporting

C.

Recovery

D.

Remediation

Question # 58

A vulnerability in which of the following components would be MOST difficult to detect?

A.

Kernel

B.

Shared libraries

C.

Hardware

D.

System application

Question # 59

An organization has hired a security services firm to conduct a penetration test. Which of the following will the organization provide to the tester?

A.

Limits and scope of the testing.

B.

Physical location of server room and wiring closet.

C.

Logical location of filters and concentrators.

D.

Employee directory and organizational chart.

Question # 60

A security engineer is designing a Customer Relationship Management (CRM) application for a third-party vendor. In which phase of the System Development Life Cycle (SDLC) will it be MOST beneficial to conduct a data sensitivity assessment?

A.

Development / Acquisition

B.

Initiation

C.

Enumeration

D.

Operation / Maintenance

Go to page: