CISSP Premium Bundle

CISSP Premium Bundle

Certified Information Systems Security Professional (CISSP) Certification Exam

4.5 
(29790 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 29, 2024Last update

ISC2 CISSP Free Practice Questions

Q1. Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen? 

A. Set up a BIOS and operating system password 

B. Encrypt the virtual drive where confidential files can be stored 

C. Implement a mandatory policy in which sensitive data cannot be stored on laptops, but only on the corporate network 

D. Encrypt the entire disk and delete contents after a set number of failed access attempts 

Answer:

Q2. Refer.to the information below to answer the question. 

Desktop computers in an organization were sanitized.for re-use.in an equivalent security environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data that was formerly stored on the magnetic drives were removed. 

After magnetic drives were degaussed twice according to the product manufacturer's directions, what is the MOST LIKELY security issue with degaussing? 

A. Commercial products often have serious weaknesses of the magnetic force available in the degausser product. 

B. Degausser products may not be properly maintained and operated. 

C. The inability to turn the drive around in the chamber for the second pass due to human error. 

D. Inadequate record keeping when sanitizing media. 

Answer:

Q3. When is security personnel involvement in the Systems Development Life Cycle (SDLC) process MOST beneficial? 

A. Testing phase 

B. Development phase 

C. Requirements definition phase 

D. Operations and maintenance phase 

Answer:

Q4. Following the completion of a network security assessment, which of the following can BEST be demonstrated? 

A. The effectiveness of controls can be accurately measured 

B. A penetration test of the network will fail 

C. The network is compliant to industry standards 

D. All unpatched vulnerabilities have been identified 

Answer:

Q5. Which of the following is a critical factor for implementing a successful data classification program? 

A. Executive sponsorship 

B. Information security sponsorship 

C. End-user acceptance 

D. Internal audit acceptance 

Answer:

Q6. An organization allows ping traffic into and out of their network. An attacker has installed a program on the network that uses the payload portion of the ping packet to move data into and out of the network. What type of attack has the organization experienced? 

A. Data leakage 

B. Unfiltered channel 

C. Data emanation 

D. Covert channel 

Answer:

Q7. A business has implemented Payment Card Industry Data Security Standard (PCI-DSS) compliant handheld credit card processing on their Wireless Local Area Network.(WLAN) topology. The.network team.partitioned the WLAN to.create a private segment for credit card processing using a firewall to control device access and route traffic to the card processor on the Internet. What components are in the scope of PCI-DSS? 

A. The entire enterprise network infrastructure. 

B. The handheld devices, wireless access points and border gateway. 

C. The end devices, wireless access points, WLAN, switches, management console, and firewall. 

D. The end devices, wireless access points, WLAN, switches, management console, and Internet 

Answer:

Q8. Multi-Factor Authentication (MFA) is necessary in many systems given common types of password attacks. Which of the following is a correct list of password attacks? 

A. Masquerading, salami, malware, polymorphism 

B. Brute force, dictionary, phishing, keylogger 

C. Zeus, netbus, rabbit, turtle 

D. Token, biometrics, IDS, DLP 

Answer:

Q9. Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review? 

A. It has normalized severity ratings. 

B. It has many worksheets and practices to implement. 

C. It aims to calculate the risk of published vulnerabilities. 

D. It requires a robust risk management framework to be put in place. 

Answer:

Q10. What is the process called when impact values are assigned.to the.security objectives for information types? 

A. Qualitative analysis 

B. Quantitative analysis 

C. Remediation 

D. System security categorization 

Answer:

Q11. Which of the following entities is ultimately.accountable.for data remanence vulnerabilities with data replicated by a cloud service provider? 

A. Data owner 

B. Data steward 

C. Data custodian 

D. Data processor 

Answer:

Q12. Changes to a Trusted Computing Base (TCB) system that could impact the security posture of that system and trigger a recertification activity are documented in the 

A. security impact analysis. 

B. structured code review. 

C. routine self assessment. 

D. cost benefit analysis. 

Answer:

Q13. Why is a system's criticality classification important in large organizations? 

A. It provides for proper prioritization and scheduling of security and maintenance tasks. 

B. It reduces critical system support workload and reduces the time required to apply patches. 

C. It allows for clear systems status communications to executive management. 

D. It provides for easier determination of ownership, reducing confusion as to the status of the asset. 

Answer:

START CISSP EXAM