Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 2 days ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 76

The key benefits of a signed and encrypted e-mail include

Options:

A.  

confidentiality, authentication, and authorization.

B.  

confidentiality, non-repudiation, and authentication.

C.  

non-repudiation, authorization, and authentication.

D.  

non-repudiation, confidentiality, and authorization.

Discussion 0
Question # 77

When network management is outsourced to third parties, which of the following is the MOST effective method of protecting critical data assets?

Options:

A.  

Log all activities associated with sensitive systems

B.  

Provide links to security policies

C.  

Confirm that confidentially agreements are signed

D.  

Employ strong access controls

Discussion 0
Question # 78

Extensible Authentication Protocol-Message Digest 5 (EAP-MD5) only provides which of the following?

Options:

A.  

Mutual authentication

B.  

Server authentication

C.  

User authentication

D.  

Streaming ciphertext data

Discussion 0
Question # 79

“Stateful” differs from “Static” packet filtering firewalls by being aware of which of the following?

Options:

A.  

Difference between a new and an established connection

B.  

Originating network location

C.  

Difference between a malicious and a benign packet payload

D.  

Originating application session

Discussion 0
Question # 80

An organization adopts a new firewall hardening standard. How can the security professional verify that the technical staff correct implemented the new standard?

Options:

A.  

Perform a compliance review

B.  

Perform a penetration test

C.  

Train the technical staff

D.  

Survey the technical staff

Discussion 0
Question # 81

As part of an application penetration testing process, session hijacking can BEST be achieved by which of the following?

Options:

A.  

Known-plaintext attack

B.  

Denial of Service (DoS)

C.  

Cookie manipulation

D.  

Structured Query Language (SQL) injection

Discussion 0
Question # 82

A security professional determines that a number of outsourcing contracts inherited from a previous merger do not adhere to the current security requirements. Which of the following BEST minimizes the risk of this

happening again?

Options:

A.  

Define additional security controls directly after the merger

B.  

Include a procurement officer in the merger team

C.  

Verify all contracts before a merger occurs

D.  

Assign a compliancy officer to review the merger conditions

Discussion 0
Question # 83

Which of the following is the BEST metric to obtain when gaining support for an Identify and Access

Management (IAM) solution?

Options:

A.  

Application connection successes resulting in data leakage

B.  

Administrative costs for restoring systems after connection failure

C.  

Employee system timeouts from implementing wrong limits

D.  

Help desk costs required to support password reset requests

Discussion 0
Question # 84

Who is responsible for the protection of information when it is shared with or provided to other organizations?

Options:

A.  

Systems owner

B.  

Authorizing Official (AO)

C.  

Information owner

D.  

Security officer

Discussion 0
Question # 85

Which type of test would an organization perform in order to locate and target exploitable defects?

Options:

A.  

Penetration

B.  

System

C.  

Performance

D.  

Vulnerability

Discussion 0
Question # 86

A vulnerability assessment report has been submitted to a client. The client indicates that one third of the hosts

that were in scope are missing from the report.

In which phase of the assessment was this error MOST likely made?

Options:

A.  

Enumeration

B.  

Reporting

C.  

Detection

D.  

Discovery

Discussion 0
Question # 87

What is the BEST location in a network to place Virtual Private Network (VPN) devices when an internal review reveals network design flaws in remote access?

Options:

A.  

In a dedicated Demilitarized Zone (DMZ)

B.  

In its own separate Virtual Local Area Network (VLAN)

C.  

At the Internet Service Provider (ISP)

D.  

Outside the external firewall

Discussion 0
Question # 88

As part of the security assessment plan, the security professional has been asked to use a negative testing strategy on a new website. Which of the following actions would be performed?

Options:

A.  

Use a web scanner to scan for vulnerabilities within the website.

B.  

Perform a code review to ensure that the database references are properly addressed.

C.  

Establish a secure connection to the web server to validate that only the approved ports are open.

D.  

Enter only numbers in the web form and verify that the website prompts the user to enter a valid input.

Discussion 0
Question # 89

Which security access policy contains fixed security attributes that are used by the system to determine a

user’s access to a file or object?

Options:

A.  

Mandatory Access Control (MAC)

B.  

Access Control List (ACL)

C.  

Discretionary Access Control (DAC)

D.  

Authorized user control

Discussion 0
Question # 90

What Is the FIRST step in establishing an information security program?

Options:

A.  

Establish an information security policy.

B.  

Identify factors affecting information security.

C.  

Establish baseline security controls.

D.  

Identify critical security infrastructure.

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions