CISSP Premium Bundle

CISSP Premium Bundle

Certified Information Systems Security Professional (CISSP) Certification Exam

4.5 
(26625 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 29, 2024Last update

ISC2 CISSP Free Practice Questions

Q1. An organization publishes and periodically updates its employee policies in a file on their intranet. Which of the following is a PRIMARY security concern? 

A. Availability 

B. Confidentiality 

C. Integrity 

D. Ownership 

Answer:

Q2. A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected? 

A. Trojan horse 

B. Denial of Service (DoS) 

C. Spoofing 

D. Man-in-the-Middle (MITM) 

Answer:

Q3. DRAG DROP 

During the risk assessment phase of the project the CISO discovered that a college within the University is collecting Protected Health Information (PHI) data via an application that was developed in-house. The college collecting this data is fully aware of the regulations for Health Insurance Portability and Accountability Act (HIPAA) and is fully compliant. 

What is the best approach for the CISO? 

Below are the common phases to creating a Business Continuity/Disaster Recovery (BC/DR) plan. Drag the remaining BC\DR phases to the appropriate corresponding location. 

Answer:  

Q4. Refer.to the information below to answer the question. 

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns. 

What is the BEST reason for the organization to pursue a plan to mitigate client-based attacks? 

A. Client privilege administration is inherently weaker than server privilege administration. 

B. Client hardening and management is easier on clients than on servers. 

C. Client-based attacks are more common and easier to exploit than server and network based attacks. 

D. Client-based attacks have higher financial impact. 

Answer:

Q5. Which of the following is the BEST countermeasure to brute force login attacks? 

A. Changing all canonical passwords 

B. Decreasing the number of concurrent user sessions 

C. Restricting initial password delivery only in person 

D. Introducing a delay after failed system access attempts 

Answer:

Q6. Which of the following has the GREATEST impact on an organization's security posture? 

A. International and country-specific compliance requirements 

B. Security.violations by employees and contractors 

C. Resource constraints due to increasing costs of supporting security 

D. Audit findings related to employee access and permissions process 

Answer:

Q7. In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan? 

A. Communication 

B. Planning 

C. Recovery 

D. Escalation 

Answer:

Q8. Which item below is a federated identity standard? 

A. 802.11i 

B. Kerberos 

C. Lightweight Directory Access Protocol (LDAP) 

D. Security Assertion Markup Language (SAML) 

Answer:

Q9. Which of the following is the FIRST step of a penetration test plan? 

A. Analyzing a network diagram of the target network 

B. Notifying the company's customers 

C. Obtaining the approval of the company's management 

D. Scheduling the penetration test during a period of least impact 

Answer:

Q10. Which of the following BEST describes the purpose of performing security certification? 

A. To identify system threats, vulnerabilities, and acceptable level of risk 

B. To formalize the confirmation of compliance to security policies and standards 

C. To formalize the confirmation of completed risk mitigation and risk analysis 

D. To verify that system architecture and interconnections with other systems are effectively implemented 

Answer:

Q11. Which of the following is an essential step before performing Structured Query Language (SQL) penetration tests on a production system? 

A. Verify countermeasures have been deactivated. 

B. Ensure firewall logging has been activated. 

C. Validate target systems have been backed up. 

D. Confirm warm site is ready to accept connections. 

Answer:

Q12. Which of the following disaster recovery test plans will be MOST effective while providing minimal risk? 

A. Read-through 

B. Parallel 

C. Full interruption 

D. Simulation 

Answer:

Q13. The BEST method to mitigate the risk of a dictionary attack on a system is to 

A. use a hardware token. 

B. use complex passphrases. 

C. implement password history. 

D. encrypt the access control list (ACL). 

Answer:

Q14. A large bank deploys hardware tokens to all customers that use their online banking system. The token generates and displays a six digit numeric password every 60 seconds. The customers must log into their bank accounts using this numeric password. This is an example of 

A. asynchronous token. 

B. Single Sign-On (SSO) token. 

C. single factor authentication token. 

D. synchronous token. 

Answer:

Q15. Which of the following is the BEST way to verify the integrity of a software patch? 

A. Cryptographic checksums 

B. Version numbering 

C. Automatic updates 

D. Vendor assurance 

Answer:

START CISSP EXAM