Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 1 hour ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 211

In a Transmission Control Protocol/Internet Protocol (TCP/IP) stack, which layer is responsible for negotiating and establishing a connection with another node?

Options:

A.  

Transport layer

B.  

Application layer

C.  

Network layer

D.  

Session layer

Discussion 0
Question # 212

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

Options:

A.  

Packet filtering

B.  

Port services filtering

C.  

Content filtering

D.  

Application access control

Discussion 0
Question # 213

Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?

Options:

A.  

Intrusion Prevention Systems (IPS)

B.  

Intrusion Detection Systems (IDS)

C.  

Stateful firewalls

D.  

Network Behavior Analysis (NBA) tools

Discussion 0
Question # 214

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

Options:

A.  

Implement packet filtering on the network firewalls

B.  

Install Host Based Intrusion Detection Systems (HIDS)

C.  

Require strong authentication for administrators

D.  

Implement logical network segmentation at the switches

Discussion 0
Question # 215

Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?

Options:

A.  

WEP uses a small range Initialization Vector (IV)

B.  

WEP uses Message Digest 5 (MD5)

C.  

WEP uses Diffie-Hellman

D.  

WEP does not use any Initialization Vector (IV)

Discussion 0
Question # 216

What is the purpose of an Internet Protocol (IP) spoofing attack?

Options:

A.  

To send excessive amounts of data to a process, making it unpredictable

B.  

To intercept network traffic without authorization

C.  

To disguise the destination address from a target’s IP filtering devices

D.  

To convince a system that it is communicating with a known entity

Discussion 0
Question # 217

At what level of the Open System Interconnection (OSI) model is data at rest on a Storage Area Network (SAN) located?

Options:

A.  

Link layer

B.  

Physical layer

C.  

Session layer

D.  

Application layer

Discussion 0
Question # 218

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?

Options:

A.  

Add a new rule to the application layer firewall

B.  

Block access to the service

C.  

Install an Intrusion Detection System (IDS)

D.  

Patch the application source code

Discussion 0
Question # 219

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

Options:

A.  

Layer 2 Tunneling Protocol (L2TP)

B.  

Link Control Protocol (LCP)

C.  

Challenge Handshake Authentication Protocol (CHAP)

D.  

Packet Transfer Protocol (PTP)

Discussion 0
Question # 220

Which of the following is of GREATEST assistance to auditors when reviewing system configurations?

Options:

A.  

Change management processes

B.  

User administration procedures

C.  

Operating System (OS) baselines

D.  

System backup documentation

Discussion 0
Question # 221

In which of the following programs is it MOST important to include the collection of security process data?

Options:

A.  

Quarterly access reviews

B.  

Security continuous monitoring

C.  

Business continuity testing

D.  

Annual security training

Discussion 0
Question # 222

Which of the following could cause a Denial of Service (DoS) against an authentication system?

Options:

A.  

Encryption of audit logs

B.  

No archiving of audit logs

C.  

Hashing of audit logs

D.  

Remote access audit logs

Discussion 0
Question # 223

Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?

Options:

A.  

Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken

B.  

Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability

C.  

Management teams will understand the testing objectives and reputational risk to the organization

D.  

Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels

Discussion 0
Question # 224

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?

Options:

A.  

Host VM monitor audit logs

B.  

Guest OS access controls

C.  

Host VM access controls

D.  

Guest OS audit logs

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions