Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 1 minute ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 151

Which of the following represents the GREATEST risk to data confidentiality?

Options:

A.  

Network redundancies are not implemented

B.  

Security awareness training is not completed

C.  

Backup tapes are generated unencrypted

D.  

Users have administrative privileges

Discussion 0
Question # 152

What is the MOST important consideration from a data security perspective when an organization plans to relocate?

Options:

A.  

Ensure the fire prevention and detection systems are sufficient to protect personnel

B.  

Review the architectural plans to determine how many emergency exits are present

C.  

Conduct a gap analysis of a new facilities against existing security requirements

D.  

Revise the Disaster Recovery and Business Continuity (DR/BC) plan

Discussion 0
Question # 153

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?

Options:

A.  

Examine the device for physical tampering

B.  

Implement more stringent baseline configurations

C.  

Purge or re-image the hard disk drive

D.  

Change access codes

Discussion 0
Question # 154

Which of the following terms BEST describes a system which allows a user to log in and access multiple related servers and applications?

Options:

A.  

Remote Desktop Protocol (RDP)

B.  

Federated identity management (FIM)

C.  

Single sign-on (SSO)

D.  

Multi-factor authentication (MFA)

Discussion 0
Question # 155

Which of the below strategies would MOST comprehensively address the risk of malicious insiders leaking sensitive information?

Options:

A.  

Data Loss Protection (DIP), firewalls, data classification

B.  

Least privilege access, Data Loss Protection (DLP), physical access controls

C.  

Staff vetting, least privilege access, Data Loss Protection (DLP)

D.  

Background checks, data encryption, web proxies

Discussion 0
Question # 156

Which of the following is true of Service Organization Control (SOC) reports?

Options:

A.  

SOC 1 Type 2 reports assess the security, confidentiality, integrity, and availability of an organization’s controls

B.  

SOC 2 Type 2 reports include information of interest to the service organization’s management

C.  

SOC 2 Type 2 reports assess internal controls for financial reporting

D.  

SOC 3 Type 2 reports assess internal controls for financial reporting

Discussion 0
Question # 157

A security engineer is designing a Customer Relationship Management (CRM) application for a third-party vendor. In which phase of the System Development Life Cycle (SDLC) will it be MOST beneficial to conduct a data sensitivity assessment?

Options:

A.  

Development / Acquisition

B.  

Initiation

C.  

Enumeration

D.  

Operation / Maintenance

Discussion 0
Question # 158

Information security practitioners are in the midst of implementing a new firewall. Which of the following failure methods would BEST prioritize security in the event of failure?

Options:

A.  

Fail-Closed

B.  

Fail-Open

C.  

Fail-Safe

D.  

Failover

Discussion 0
Question # 159

Which of the following is a characteristic of a challenge/response authentication process?

Options:

A.  

Presenting distorted graphics of text for authentication

B.  

Transmitting a hash based on the user's password

C.  

Using a password history blacklist

D.  

Requiring the use of non-consecutive numeric characters

Discussion 0
Question # 160

What Hypertext Transfer Protocol (HTTP) response header can be used to disable the execution of inline JavaScript and the execution of eval()-type functions?

Options:

A.  

Strict-Transport-Security

B.  

X-XSS-Protection

C.  

X-Frame-Options

D.  

Content-Security-Policy

Discussion 0
Question # 161

A software engineer uses automated tools to review application code and search for application flaws, back doors, or other malicious code. Which of the following is the

FIRST Software Development Life Cycle (SDLC) phase where this takes place?

Options:

A.  

Design

B.  

Test

C.  

Development

D.  

Deployment

Discussion 0
Question # 162

What is the MOST common security risk of a mobile device?

Options:

A.  

Insecure communications link

B.  

Data leakage

C.  

Malware infection

D.  

Data spoofing

Discussion 0
Question # 163

Which of the following authorization standards is built to handle Application programming Interface (API) access for federated Identity management (FIM)?

Options:

A.  

Remote Authentication Dial-In User Service (RADIUS)

B.  

Terminal Access Controller Access Control System Plus (TACACS+)

C.  

Open Authentication (OAuth)

D.  

Security Assertion Markup Language (SAML)

Discussion 0
Question # 164

In what phase of the System Development Life Cycle (SDLC) should security training for the development team begin?

Options:

A.  

Development/Acquisition

B.  

Initiation

C.  

Implementation/ Assessment

D.  

Disposal

Discussion 0
Question # 165

A hospital’s building controls system monitors and operates the environmental equipment to maintain a safe and comfortable environment. Which of the following could be used to minimize the risk of utility supply interruption?

Options:

A.  

Digital devices that can turn equipment off and continuously cycle rapidly in order to increase supplies and conceal activity on the hospital network

B.  

Standardized building controls system software with high connectivity to hospital networks

C.  

Lock out maintenance personnel from the building controls system access that can impact critical utility supplies

D.  

Digital protection and control devices capable of minimizing the adverse impact to critical utility

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions