New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

Good News !!! CISSP Certified Information Systems Security Professional (CISSP) is now Stable and With Pass Result

Exams4sure Dumps

CISSP Practice Exam Questions and Answers

Certified Information Systems Security Professional (CISSP)

Last Update 1 week ago
Total Questions : 1486

Certified Information Systems Security Professional (CISSP) is stable now with all latest exam questions are added 1 week ago. Incorporating CISSP practice exam questions into your study plan is more than just a preparation strategy.

CISSP exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through CISSP dumps allows you to practice pacing yourself, ensuring that you can complete all Certified Information Systems Security Professional (CISSP) practice test within the allotted time frame.

CISSP PDF

CISSP PDF (Printable)
$139.65
$399

CISSP Testing Engine

CISSP PDF (Printable)
$157.15
$449

CISSP PDF + Testing Engine

CISSP PDF (Printable)
$209.65
$599
Question # 1

Refer to the information below to answer the question.

A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.

Which of the following BEST describes the access control methodology used?

Options:

A.  

Least privilege

B.  

Lattice Based Access Control (LBAC)

C.  

Role Based Access Control (RBAC)

D.  

Lightweight Directory Access Control (LDAP)

Discussion 0
Question # 2

Which of the following provides effective management assurance for a Wireless Local Area Network (WLAN)?

Options:

A.  

Maintaining an inventory of authorized Access Points (AP) and connecting devices

B.  

Setting the radio frequency to the minimum range required

C.  

Establishing a Virtual Private Network (VPN) tunnel between the WLAN client device and a VPN concentrator

D.  

Verifying that all default passwords have been changed

Discussion 0
Question # 3

Refer to the information below to answer the question.

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access.

Which of the following solutions would have MOST likely detected the use of peer-to-peer programs when the computer was connected to the office network?

Options:

A.  

Anti-virus software

B.  

Intrusion Prevention System (IPS)

C.  

Anti-spyware software

D.  

Integrity checking software

Discussion 0
Question # 4

Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen?

Options:

A.  

Set up a BIOS and operating system password

B.  

Encrypt the virtual drive where confidential files can be stored

C.  

Implement a mandatory policy in which sensitive data cannot be stored on laptops, but only on the corporate network

D.  

Encrypt the entire disk and delete contents after a set number of failed access attempts

Discussion 0
Question # 5

Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review?

Options:

A.  

It has normalized severity ratings.

B.  

It has many worksheets and practices to implement.

C.  

It aims to calculate the risk of published vulnerabilities.

D.  

It requires a robust risk management framework to be put in place.

Discussion 0
Question # 6

Which of the following is a security feature of Global Systems for Mobile Communications (GSM)?

Options:

A.  

It uses a Subscriber Identity Module (SIM) for authentication.

B.  

It uses encrypting techniques for all communications.

C.  

The radio spectrum is divided with multiple frequency carriers.

D.  

The signal is difficult to read as it provides end-to-end encryption.

Discussion 0
Question # 7

When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include

Options:

A.  

hardened building construction with consideration of seismic factors.

B.  

adequate distance from and lack of access to adjacent buildings.

C.  

curved roads approaching the data center.

D.  

proximity to high crime areas of the city.

Discussion 0
Question # 8

An internal Service Level Agreement (SLA) covering security is signed by senior managers and is in place. When should compliance to the SLA be reviewed to ensure that a good security posture is being delivered?

Options:

A.  

As part of the SLA renewal process

B.  

Prior to a planned security audit

C.  

Immediately after a security breach

D.  

At regularly scheduled meetings

Discussion 0
Question # 9

The Structured Query Language (SQL) implements Discretionary Access Controls (DAC) using

Options:

A.  

INSERT and DELET

E.  

B.  

GRANT and REVOK

E.  

C.  

PUBLIC and PRIVAT

E.  

D.  

ROLLBACK and TERMINAT

E.  

Discussion 0
Question # 10

A Business Continuity Plan (BCP) is based on

Options:

A.  

the policy and procedures manual.

B.  

an existing BCP from a similar organization.

C.  

a review of the business processes and procedures.

D.  

a standard checklist of required items and objectives.

Discussion 0
Question # 11

What is the MOST critical factor to achieve the goals of a security program?

Options:

A.  

Capabilities of security resources

B.  

Executive management support

C.  

Effectiveness of security management

D.  

Budget approved for security resources

Discussion 0
Question # 12

Which of the following is a BEST practice when traveling internationally with laptops containing Personally Identifiable Information (PII)?

Options:

A.  

Use a thumb drive to transfer information from a foreign computer.

B.  

Do not take unnecessary information, including sensitive information.

C.  

Connect the laptop only to well-known networks like the hotel or public Internet cafes.

D.  

Request international points of contact help scan the laptop on arrival to ensure it is protected.

Discussion 0
Question # 13

During an investigation of database theft from an organization's web site, it was determined that the Structured Query Language (SQL) injection technique was used despite input validation with client-side scripting. Which of the following provides the GREATEST protection against the same attack occurring again?

Options:

A.  

Encrypt communications between the servers

B.  

Encrypt the web server traffic

C.  

Implement server-side filtering

D.  

Filter outgoing traffic at the perimeter firewall

Discussion 0
Question # 14

Which of the following is the MOST beneficial to review when performing an IT audit?

Options:

A.  

Audit policy

B.  

Security log

C.  

Security policies

D.  

Configuration settings

Discussion 0
Question # 15

Refer to the information below to answer the question.

A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes.

In addition to authentication at the start of the user session, best practice would require re-authentication

Options:

A.  

periodically during a session.

B.  

for each business process.

C.  

at system sign-off.

D.  

after a period of inactivity.

Discussion 0
Get CISSP dumps and pass your exam in 24 hours!

Free Exams Sample Questions