Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 5 days ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 61

Which security action should be taken FIRST when computer personnel are terminated from their jobs?

Options:

A.  

Remove their computer access

B.  

Require them to turn in their badge

C.  

Conduct an exit interview

D.  

Reduce their physical access level to the facility

Discussion 0
Question # 62

What maintenance activity is responsible for defining, implementing, and testing updates to application systems?

Options:

A.  

Program change control

B.  

Regression testing

C.  

Export exception control

D.  

User acceptance testing

Discussion 0
Question # 63

The stringency of an Information Technology (IT) security assessment will be determined by the

Options:

A.  

system's past security record.

B.  

size of the system's database.

C.  

sensitivity of the system's dat

A.  

D.  

age of the system.

Discussion 0
Question # 64

Which one of these risk factors would be the LEAST important consideration in choosing a building site for a new computer facility?

Options:

A.  

Vulnerability to crime

B.  

Adjacent buildings and businesses

C.  

Proximity to an airline flight path

D.  

Vulnerability to natural disasters

Discussion 0
Question # 65

The PRIMARY purpose of a security awareness program is to

Options:

A.  

ensure that everyone understands the organization's policies and procedures.

B.  

communicate that access to information will be granted on a need-to-know basis.

C.  

warn all users that access to all systems will be monitored on a daily basis.

D.  

comply with regulations related to data and information protection.

Discussion 0
Question # 66

An advantage of link encryption in a communications network is that it

Options:

A.  

makes key management and distribution easier.

B.  

protects data from start to finish through the entire network.

C.  

improves the efficiency of the transmission.

D.  

encrypts all information, including headers and routing information.

Discussion 0
Question # 67

Which of the following is an essential element of a privileged identity lifecycle management?

Options:

A.  

Regularly perform account re-validation and approval

B.  

Account provisioning based on multi-factor authentication

C.  

Frequently review performed activities and request justification

D.  

Account information to be provided by supervisor or line manager

Discussion 0
Question # 68

Which of the following does the Encapsulating Security Payload (ESP) provide?

Options:

A.  

Authorization and integrity

B.  

Availability and integrity

C.  

Integrity and confidentiality

D.  

Authorization and confidentiality

Discussion 0
Question # 69

A software scanner identifies a region within a binary image having high entropy. What does this MOST likely indicate?

Options:

A.  

Encryption routines

B.  

Random number generator

C.  

Obfuscated code

D.  

Botnet command and control

Discussion 0
Question # 70

What principle requires that changes to the plaintext affect many parts of the ciphertext?

Options:

A.  

Diffusion

B.  

Encapsulation

C.  

Obfuscation

D.  

Permutation

Discussion 0
Question # 71

In a financial institution, who has the responsibility for assigning the classification to a piece of information?

Options:

A.  

Chief Financial Officer (CFO)

B.  

Chief Information Security Officer (CISO)

C.  

Originator or nominated owner of the information

D.  

Department head responsible for ensuring the protection of the information

Discussion 0
Question # 72

When constructing an Information Protection Policy (IPP), it is important that the stated rules are necessary, adequate, and

Options:

A.  

flexible.

B.  

confidential.

C.  

focused.

D.  

achievable.

Discussion 0
Question # 73

What would be the PRIMARY concern when designing and coordinating a security assessment for an Automatic Teller Machine (ATM) system?

Options:

A.  

Physical access to the electronic hardware

B.  

Regularly scheduled maintenance process

C.  

Availability of the network connection

D.  

Processing delays

Discussion 0
Question # 74

Which of the following Disaster Recovery (DR) sites is the MOST difficult to test?

Options:

A.  

Hot site

B.  

Cold site

C.  

Warm site

D.  

Mobile site

Discussion 0
Question # 75

Which of the following is an attacker MOST likely to target to gain privileged access to a system?

Options:

A.  

Programs that write to system resources

B.  

Programs that write to user directories

C.  

Log files containing sensitive information

D.  

Log files containing system calls

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions