Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 5 days ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 31

What type of encryption is used to protect sensitive data in transit over a network?

Options:

A.  

Payload encryption and transport encryption

B.  

Authentication Headers (AH)

C.  

Keyed-Hashing for Message Authentication

D.  

Point-to-Point Encryption (P2PE)

Discussion 0
Question # 32

Which of the following countermeasures is the MOST effective in defending against a social engineering attack?

Options:

A.  

Mandating security policy acceptance

B.  

Changing individual behavior

C.  

Evaluating security awareness training

D.  

Filtering malicious e-mail content

Discussion 0
Question # 33

Which of the following could elicit a Denial of Service (DoS) attack against a credential management system?

Options:

A.  

Delayed revocation or destruction of credentials

B.  

Modification of Certificate Revocation List

C.  

Unauthorized renewal or re-issuance

D.  

Token use after decommissioning

Discussion 0
Question # 34

Network-based logging has which advantage over host-based logging when reviewing malicious activity about a victim machine?

Options:

A.  

Addresses and protocols of network-based logs are analyzed.

B.  

Host-based system logging has files stored in multiple locations.

C.  

Properly handled network-based logs may be more reliable and valid.

D.  

Network-based systems cannot capture users logging into the console.

Discussion 0
Question # 35

Which one of the following is a common risk with network configuration management?

Options:

A.  

Patches on the network are difficult to keep current.

B.  

It is the responsibility of the systems administrator.

C.  

User ID and passwords are never set to expire.

D.  

Network diagrams are not up to date.

Discussion 0
Question # 36

Which of the following PRIMARILY contributes to security incidents in web-based applications?

Options:

A.  

Systems administration and operating systems

B.  

System incompatibility and patch management

C.  

Third-party applications and change controls

D.  

Improper stress testing and application interfaces

Discussion 0
Question # 37

Internet Protocol (IP) source address spoofing is used to defeat

Options:

A.  

address-based authentication.

B.  

Address Resolution Protocol (ARP).

C.  

Reverse Address Resolution Protocol (RARP).

D.  

Transmission Control Protocol (TCP) hijacking.

Discussion 0
Question # 38

Which of the following statements is TRUE of black box testing?

Options:

A.  

Only the functional specifications are known to the test planner.

B.  

Only the source code and the design documents are known to the test planner.

C.  

Only the source code and functional specifications are known to the test planner.

D.  

Only the design documents and the functional specifications are known to the test planner.

Discussion 0
Question # 39

A vulnerability test on an Information System (IS) is conducted to

Options:

A.  

exploit security weaknesses in the IS.

B.  

measure system performance on systems with weak security controls.

C.  

evaluate the effectiveness of security controls.

D.  

prepare for Disaster Recovery (DR) planning.

Discussion 0
Question # 40

Why MUST a Kerberos server be well protected from unauthorized access?

Options:

A.  

It contains the keys of all clients.

B.  

It always operates at root privilege.

C.  

It contains all the tickets for services.

D.  

It contains the Internet Protocol (IP) address of all network entities.

Discussion 0
Question # 41

A practice that permits the owner of a data object to grant other users access to that object would usually provide

Options:

A.  

Mandatory Access Control (MAC).

B.  

owner-administered control.

C.  

owner-dependent access control.

D.  

Discretionary Access Control (DAC).

Discussion 0
Question # 42

Which of the following is an effective method for avoiding magnetic media data remanence?

Options:

A.  

Degaussing

B.  

Encryption

C.  

Data Loss Prevention (DLP)

D.  

Authentication

Discussion 0
Question # 43

Which of the following BEST describes Recovery Time Objective (RTO)?

Options:

A.  

Time of data validation after disaster

B.  

Time of data restoration from backup after disaster

C.  

Time of application resumption after disaster

D.  

Time of application verification after disaster

Discussion 0
Question # 44

Refer to the information below to answer the question.

An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other necessary components to have an effective security program. There are numerous initiatives requiring security involvement.

Which of the following is considered the MOST important priority for the information security officer?

Options:

A.  

Formal acceptance of the security strategy

B.  

Disciplinary actions taken against unethical behavior

C.  

Development of an awareness program for new employees

D.  

Audit of all organization system configurations for faults

Discussion 0
Question # 45

Refer to the information below to answer the question.

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.

Which of the following could have MOST likely prevented the Peer-to-Peer (P2P) program from being installed on the computer?

Options:

A.  

Removing employee's full access to the computer

B.  

Supervising their child's use of the computer

C.  

Limiting computer's access to only the employee

D.  

Ensuring employee understands their business conduct guidelines

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions