Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Information Systems Security Professional (CISSP)

Last Update 13 hours ago Total Questions : 1485

The Certified Information Systems Security Professional (CISSP) content is now fully updated, with all current exam questions added 13 hours ago. Deciding to include CISSP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our CISSP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these CISSP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Information Systems Security Professional (CISSP) practice test comfortably within the allotted time.

Question # 121

Which of the following is the FIRST step in the incident response process?

A.

Determine the cause of the incident

B.

Disconnect the system involved from the network

C.

Isolate and contain the system involved

D.

Investigate all symptoms to confirm the incident

Question # 122

When is a Business Continuity Plan (BCP) considered to be valid?

A.

When it has been validated by the Business Continuity (BC) manager

B.

When it has been validated by the board of directors

C.

When it has been validated by all threat scenarios

D.

When it has been validated by realistic exercises

Question # 123

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

A.

Absence of a Business Intelligence (BI) solution

B.

Inadequate cost modeling

C.

Improper deployment of the Service-Oriented Architecture (SOA)

D.

Insufficient Service Level Agreement (SLA)

Question # 124

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

A.

Guaranteed recovery of all business functions

B.

Minimization of the need decision making during a crisis

C.

Insurance against litigation following a disaster

D.

Protection from loss of organization resources

Question # 125

What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?

A.

Warm site

B.

Hot site

C.

Mirror site

D.

Cold site

Question # 126

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

A.

Take the computer to a forensic lab

B.

Make a copy of the hard drive

C.

Start documenting

D.

Turn off the computer

Question # 127

What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?

A.

Audit logs

B.

Role-Based Access Control (RBAC)

C.

Two-factor authentication

D.

Application of least privilege

Question # 128

When auditing the Software Development Life Cycle (SDLC) which of the following is one of the high-level audit phases?

A.

Requirements

B.

Risk assessment

C.

Due diligence

D.

Planning

Question # 129

Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?

A.

Derived credential

B.

Temporary security credential

C.

Mobile device credentialing service

D.

Digest authentication

Question # 130

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?

A.

Examine the device for physical tampering

B.

Implement more stringent baseline configurations

C.

Purge or re-image the hard disk drive

D.

Change access codes

Question # 131

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

A.

Development, testing, and deployment

B.

Prevention, detection, and remediation

C.

People, technology, and operations

D.

Certification, accreditation, and monitoring

Question # 132

Intellectual property rights are PRIMARY concerned with which of the following?

A.

Owner’s ability to realize financial gain

B.

Owner’s ability to maintain copyright

C.

Right of the owner to enjoy their creation

D.

Right of the owner to control delivery method

Question # 133

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

A.

Only when assets are clearly defined

B.

Only when standards are defined

C.

Only when controls are put in place

D.

Only procedures are defined

Question # 134

What is the BEST method if an investigator wishes to analyze a hard drive which may be used as evidence?

A.

Leave the hard drive in place and use only verified and authenticated Operating Systems (OS) utilities ...

B.

Log into the system and immediately make a copy of all relevant files to a Write Once, Read Many ...

C.

Remove the hard drive from the system and make a copy of the hard drive ' s contents using imaging hardware.

D.

Use a separate bootable device to make a copy of the hard drive before booting the system and analyzing the hard drive.

Question # 135

Which of the following explains why classifying data is an important step in performing a Risk assessment?

A.

To provide a framework for developing good security metrics

B.

To justify the selection of costly security controls

C.

To classify the security controls sensitivity that helps scope the risk assessment

D.

To help determine the appropriate level of data security controls

Go to page: