Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 31 seconds ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 181

Which component of the Security Content Automation Protocol (SCAP) specification contains the data required to estimate the severity of vulnerabilities identified automated vulnerability assessments?

Options:

A.  

Common Vulnerabilities and Exposures (CVE)

B.  

Common Vulnerability Scoring System (CVSS)

C.  

Asset Reporting Format (ARF)

D.  

Open Vulnerability and Assessment Language (OVAL)

Discussion 0
Question # 182

Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?

Options:

A.  

Confidentiality

B.  

Integrity

C.  

Identification

D.  

Availability

Discussion 0
Question # 183

When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?

Options:

A.  

After the system preliminary design has been developed and the data security categorization has been performed

B.  

After the vulnerability analysis has been performed and before the system detailed design begins

C.  

After the system preliminary design has been developed and before the data security categorization begins

D.  

After the business functional analysis and the data security categorization have been performed

Discussion 0
Question # 184

Which of the following is the PRIMARY risk with using open source software in a commercial software construction?

Options:

A.  

Lack of software documentation

B.  

License agreements requiring release of modified code

C.  

Expiration of the license agreement

D.  

Costs associated with support of the software

Discussion 0
Question # 185

The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)?

Options:

A.  

System acquisition and development

B.  

System operations and maintenance

C.  

System initiation

D.  

System implementation

Discussion 0
Question # 186

What is the BEST approach to addressing security issues in legacy web applications?

Options:

A.  

Debug the security issues

B.  

Migrate to newer, supported applications where possible

C.  

Conduct a security assessment

D.  

Protect the legacy application with a web application firewall

Discussion 0
Question # 187

A Java program is being developed to read a file from computer A and write it to computer B, using a third computer

C.  

The program is not working as expected. What is the MOST probable security feature of Java preventing the program from operating as intended?

Options:

A.  

Least privilege

B.  

Privilege escalation

C.  

Defense in depth

D.  

Privilege bracketing

Discussion 0
Question # 188

Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?

Options:

A.  

Check arguments in function calls

B.  

Test for the security patch level of the environment

C.  

Include logging functions

D.  

Digitally sign each application module

Discussion 0
Question # 189

Which of the following is the BEST method to prevent malware from being introduced into a production environment?

Options:

A.  

Purchase software from a limited list of retailers

B.  

Verify the hash key or certificate key of all updates

C.  

Do not permit programs, patches, or updates from the Internet

D.  

Test all new software in a segregated environment

Discussion 0
Question # 190

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

Options:

A.  

Take the computer to a forensic lab

B.  

Make a copy of the hard drive

C.  

Start documenting

D.  

Turn off the computer

Discussion 0
Question # 191

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?

Options:

A.  

Continuously without exception for all security controls

B.  

Before and after each change of the control

C.  

At a rate concurrent with the volatility of the security control

D.  

Only during system implementation and decommissioning

Discussion 0
Question # 192

Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?

Options:

A.  

Hardware and software compatibility issues

B.  

Applications’ critically and downtime tolerance

C.  

Budget constraints and requirements

D.  

Cost/benefit analysis and business objectives

Discussion 0
Question # 193

What is the PRIMARY reason for implementing change management?

Options:

A.  

Certify and approve releases to the environment

B.  

Provide version rollbacks for system changes

C.  

Ensure that all applications are approved

D.  

Ensure accountability for changes to the environment

Discussion 0
Question # 194

Which of the following is the FIRST step in the incident response process?

Options:

A.  

Determine the cause of the incident

B.  

Disconnect the system involved from the network

C.  

Isolate and contain the system involved

D.  

Investigate all symptoms to confirm the incident

Discussion 0
Question # 195

What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?

Options:

A.  

Warm site

B.  

Hot site

C.  

Mirror site

D.  

Cold site

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions