Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 5 days ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 16

Refer to the information below to answer the question.

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles.

When determining appropriate resource allocation, which of the following is MOST important to monitor?

Options:

A.  

Number of system compromises

B.  

Number of audit findings

C.  

Number of staff reductions

D.  

Number of additional assets

Discussion 0
Question # 17

When dealing with compliance with the Payment Card Industry-Data Security Standard (PCI-DSS), an organization that shares card holder information with a service provider MUST do which of the following?

Options:

A.  

Perform a service provider PCI-DSS assessment on a yearly basis.

B.  

Validate the service provider's PCI-DSS compliance status on a regular basis.

C.  

Validate that the service providers security policies are in alignment with those of the organization.

D.  

Ensure that the service provider updates and tests its Disaster Recovery Plan (DRP) on a yearly basis.

Discussion 0
Question # 18

What physical characteristic does a retinal scan biometric device measure?

Options:

A.  

The amount of light reflected by the retina

B.  

The size, curvature, and shape of the retina

C.  

The pattern of blood vessels at the back of the eye

D.  

The pattern of light receptors at the back of the eye

Discussion 0
Question # 19

Which of the following BEST mitigates a replay attack against a system using identity federation and Security Assertion Markup Language (SAML) implementation?

Options:

A.  

Two-factor authentication

B.  

Digital certificates and hardware tokens

C.  

Timed sessions and Secure Socket Layer (SSL)

D.  

Passwords with alpha-numeric and special characters

Discussion 0
Question # 20

While impersonating an Information Security Officer (ISO), an attacker obtains information from company employees about their User IDs and passwords. Which method of information gathering has the attacker used?

Options:

A.  

Trusted path

B.  

Malicious logic

C.  

Social engineering

D.  

Passive misuse

Discussion 0
Question # 21

What is the ultimate objective of information classification?

Options:

A.  

To assign responsibility for mitigating the risk to vulnerable systems

B.  

To ensure that information assets receive an appropriate level of protection

C.  

To recognize that the value of any item of information may change over time

D.  

To recognize the optimal number of classification categories and the benefits to be gained from their use

Discussion 0
Question # 22

An organization is designing a large enterprise-wide document repository system. They plan to have several different classification level areas with increasing levels of controls. The BEST way to ensure document confidentiality in the repository is to

Options:

A.  

encrypt the contents of the repository and document any exceptions to that requirement.

B.  

utilize Intrusion Detection System (IDS) set drop connections if too many requests for documents are detected.

C.  

keep individuals with access to high security areas from saving those documents into lower security areas.

D.  

require individuals with access to the system to sign Non-Disclosure Agreements (NDA).

Discussion 0
Question # 23

Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?

Options:

A.  

Transparent Database Encryption (TDE)

B.  

Column level database encryption

C.  

Volume encryption

D.  

Data tokenization

Discussion 0
Question # 24

The BEST method of demonstrating a company's security level to potential customers is

Options:

A.  

a report from an external auditor.

B.  

responding to a customer's security questionnaire.

C.  

a formal report from an internal auditor.

D.  

a site visit by a customer's security team.

Discussion 0
Question # 25

What is an effective practice when returning electronic storage media to third parties for repair?

Options:

A.  

Ensuring the media is not labeled in any way that indicates the organization's name.

B.  

Disassembling the media and removing parts that may contain sensitive dat

A.  

C.  

Physically breaking parts of the media that may contain sensitive dat

A.  

D.  

Establishing a contract with the third party regarding the secure handling of the medi

A.  

Discussion 0
Question # 26

Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are admitted?

Options:

A.  

False Acceptance Rate (FAR)

B.  

False Rejection Rate (FRR)

C.  

Crossover Error Rate (CER)

D.  

Rejection Error Rate

Discussion 0
Question # 27

What does secure authentication with logging provide?

Options:

A.  

Data integrity

B.  

Access accountability

C.  

Encryption logging format

D.  

Segregation of duties

Discussion 0
Question # 28

Which of the following MOST influences the design of the organization's electronic monitoring policies?

Options:

A.  

Workplace privacy laws

B.  

Level of organizational trust

C.  

Results of background checks

D.  

Business ethical considerations

Discussion 0
Question # 29

A business has implemented Payment Card Industry Data Security Standard (PCI-DSS) compliant handheld credit card processing on their Wireless Local Area Network (WLAN) topology. The network team partitioned the WLAN to create a private segment for credit card processing using a firewall to control device access and route traffic to the card processor on the Internet. What components are in the scope of PCI-DSS?

Options:

A.  

The entire enterprise network infrastructure.

B.  

The handheld devices, wireless access points and border gateway.

C.  

The end devices, wireless access points, WLAN, switches, management console, and firewall.

D.  

The end devices, wireless access points, WLAN, switches, management console, and Internet

Discussion 0
Question # 30

What is the MOST effective method for gaining unauthorized access to a file protected with a long complex password?

Options:

A.  

Brute force attack

B.  

Frequency analysis

C.  

Social engineering

D.  

Dictionary attack

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions