Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 5 days ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 136

Determining outage costs caused by a disaster can BEST be measured by the

Options:

A.  

cost of redundant systems and backups.

B.  

cost to recover from an outage.

C.  

overall long-term impact of the outage.

D.  

revenue lost during the outage.

Discussion 0
Question # 137

How does a Host Based Intrusion Detection System (HIDS) identify a potential attack?

Options:

A.  

Examines log messages or other indications on the system.

B.  

Monitors alarms sent to the system administrator

C.  

Matches traffic patterns to virus signature files

D.  

Examines the Access Control List (ACL)

Discussion 0
Question # 138

A network scan found 50% of the systems with one or more critical vulnerabilities. Which of the following represents the BEST action?

Options:

A.  

Assess vulnerability risk and program effectiveness.

B.  

Assess vulnerability risk and business impact.

C.  

Disconnect all systems with critical vulnerabilities.

D.  

Disconnect systems with the most number of vulnerabilities.

Discussion 0
Question # 139

Which Web Services Security (WS-Security) specification handles the management of security tokens and the underlying policies for granting access? Click on the correct specification in the image below.

Question # 139

Options:

Discussion 0
Question # 140

Which of the following is the MOST effective method of mitigating data theft from an active user workstation?

Options:

A.  

Implement full-disk encryption

B.  

Enable multifactor authentication

C.  

Deploy file integrity checkers

D.  

Disable use of portable devices

Discussion 0
Question # 141

Which of the following BEST describes an access control method utilizing cryptographic keys derived from a smart card private key that is embedded within mobile devices?

Options:

A.  

Derived credential

B.  

Temporary security credential

C.  

Mobile device credentialing service

D.  

Digest authentication

Discussion 0
Question # 142

Users require access rights that allow them to view the average salary of groups of employees. Which control would prevent the users from obtaining an individual employee’s salary?

Options:

A.  

Limit access to predefined queries

B.  

Segregate the database into a small number of partitions each with a separate security level

C.  

Implement Role Based Access Control (RBAC)

D.  

Reduce the number of people who have access to the system for statistical purposes

Discussion 0
Question # 143

A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization?

Options:

A.  

Trusted third-party certification

B.  

Lightweight Directory Access Protocol (LDAP)

C.  

Security Assertion Markup language (SAML)

D.  

Cross-certification

Discussion 0
Question # 144

What is the BEST approach for controlling access to highly sensitive information when employees have the same level of security clearance?

Options:

A.  

Audit logs

B.  

Role-Based Access Control (RBAC)

C.  

Two-factor authentication

D.  

Application of least privilege

Discussion 0
Question # 145

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

Options:

A.  

Only when assets are clearly defined

B.  

Only when standards are defined

C.  

Only when controls are put in place

D.  

Only procedures are defined

Discussion 0
Question # 146

Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?

Options:

A.  

Install mantraps at the building entrances

B.  

Enclose the personnel entry area with polycarbonate plastic

C.  

Supply a duress alarm for personnel exposed to the public

D.  

Hire a guard to protect the public area

Discussion 0
Question # 147

A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?

Options:

A.  

Application

B.  

Storage

C.  

Power

D.  

Network

Discussion 0
Question # 148

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

Options:

A.  

Development, testing, and deployment

B.  

Prevention, detection, and remediation

C.  

People, technology, and operations

D.  

Certification, accreditation, and monitoring

Discussion 0
Question # 149

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

Options:

A.  

determine the risk of a business interruption occurring

B.  

determine the technological dependence of the business processes

C.  

Identify the operational impacts of a business interruption

D.  

Identify the financial impacts of a business interruption

Discussion 0
Question # 150

Intellectual property rights are PRIMARY concerned with which of the following?

Options:

A.  

Owner’s ability to realize financial gain

B.  

Owner’s ability to maintain copyright

C.  

Right of the owner to enjoy their creation

D.  

Right of the owner to control delivery method

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions