Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CISSP Practice Questions

Certified Information Systems Security Professional (CISSP)

Last Update 5 days ago
Total Questions : 1486

Dive into our fully updated and stable CISSP practice test platform, featuring all the latest ISC 2 Credentials exam questions added this week. Our preparation tool is more than just a ISC study aid; it's a strategic advantage.

Our free ISC 2 Credentials practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CISSP. Use this test to pinpoint which areas you need to focus your study on.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 121

What is an advantage of Elliptic Curve Cryptography (ECC)?

Options:

A.  

Cryptographic approach that does not require a fixed-length key

B.  

Military-strength security that does not depend upon secrecy of the algorithm

C.  

Opportunity to use shorter keys for the same level of security

D.  

Ability to use much longer keys for greater security

Discussion 0
Question # 122

What security risk does the role-based access approach mitigate MOST effectively?

Options:

A.  

Excessive access rights to systems and data

B.  

Segregation of duties conflicts within business applications

C.  

Lack of system administrator activity monitoring

D.  

Inappropriate access requests

Discussion 0
Question # 123

Which of the following is BEST suited for exchanging authentication and authorization messages in a multi-party decentralized environment?

Options:

A.  

Lightweight Directory Access Protocol (LDAP)

B.  

Security Assertion Markup Language (SAML)

C.  

Internet Mail Access Protocol

D.  

Transport Layer Security (TLS)

Discussion 0
Question # 124

Application of which of the following Institute of Electrical and Electronics Engineers (IEEE) standards will prevent an unauthorized wireless device from being attached to a network?

Options:

A.  

IEEE 802.1F

B.  

IEEE 802.1H

C.  

IEEE 802.1Q

D.  

IEEE 802.1X

Discussion 0
Question # 125

In the Open System Interconnection (OSI) model, which layer is responsible for the transmission of binary data over a communications network?

Options:

A.  

Application Layer

B.  

Physical Layer

C.  

Data-Link Layer

D.  

Network Layer

Discussion 0
Question # 126

Which of the following is the MOST likely cause of a non-malicious data breach when the source of the data breach was an un-marked file cabinet containing sensitive documents?

Options:

A.  

Ineffective data classification

B.  

Lack of data access controls

C.  

Ineffective identity management controls

D.  

Lack of Data Loss Prevention (DLP) tools

Discussion 0
Question # 127

The restoration priorities of a Disaster Recovery Plan (DRP) are based on which of the following documents?

Options:

A.  

Service Level Agreement (SLA)

B.  

Business Continuity Plan (BCP)

C.  

Business Impact Analysis (BIA)

D.  

Crisis management plan

Discussion 0
Question # 128

Which of the following are Systems Engineering Life Cycle (SELC) Technical Processes?

Options:

A.  

Concept, Development, Production, Utilization, Support, Retirement

B.  

Stakeholder Requirements Definition, Architectural Design, Implementation, Verification, Operation

C.  

Acquisition, Measurement, Configuration Management, Production, Operation, Support

D.  

Concept, Requirements, Design, Implementation, Production, Maintenance, Support, Disposal

Discussion 0
Question # 129

In general, servers that are facing the Internet should be placed in a demilitarized zone (DMZ). What is MAIN purpose of the DMZ?

Options:

A.  

Reduced risk to internal systems.

B.  

Prepare the server for potential attacks.

C.  

Mitigate the risk associated with the exposed server.

D.  

Bypass the need for a firewall.

Discussion 0
Question # 130

If compromised, which of the following would lead to the exploitation of multiple virtual machines?

Options:

A.  

Virtual device drivers

B.  

Virtual machine monitor

C.  

Virtual machine instance

D.  

Virtual machine file system

Discussion 0
Question # 131

A proxy firewall operates at what layer of the Open System Interconnection (OSI) model?

Options:

A.  

Transport

B.  

Data link

C.  

Network

D.  

Application

Discussion 0
Question # 132

Which of the following is the BEST method to assess the effectiveness of an organization's vulnerability management program?

Options:

A.  

Review automated patch deployment reports

B.  

Periodic third party vulnerability assessment

C.  

Automated vulnerability scanning

D.  

Perform vulnerability scan by security team

Discussion 0
Question # 133

What type of wireless network attack BEST describes an Electromagnetic Pulse (EMP) attack?

Options:

A.  

Radio Frequency (RF) attack

B.  

Denial of Service (DoS) attack

C.  

Data modification attack

D.  

Application-layer attack

Discussion 0
Question # 134

Which of the following prevents improper aggregation of privileges in Role Based Access Control (RBAC)?

Options:

A.  

Hierarchical inheritance

B.  

Dynamic separation of duties

C.  

The Clark-Wilson security model

D.  

The Bell-LaPadula security model

Discussion 0
Question # 135

The goal of a Business Continuity Plan (BCP) training and awareness program is to

Options:

A.  

enhance the skills required to create, maintain, and execute the plan.

B.  

provide for a high level of recovery in case of disaster.

C.  

describe the recovery organization to new employees.

D.  

provide each recovery team with checklists and procedures.

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions