CISSP Premium Bundle

CISSP Premium Bundle

Certified Information Systems Security Professional (CISSP) Certification Exam

4.5 
(34350 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 29, 2024Last update

ISC2 CISSP Free Practice Questions

Q1. Which of the following methods provides the MOST protection for user credentials? 

A. Forms-based authentication 

B. Digest authentication 

C. Basic authentication 

D. Self-registration 

Answer:

Q2. An engineer in a software company has created a virus creation tool. The tool can generate thousands of polymorphic viruses. The engineer is planning to use the tool in a controlled environment to test the company's next generation virus scanning software. Which would BEST describe the behavior of the engineer and why? 

A. The behavior is ethical because the tool will be used to create a better virus scanner. 

B. The behavior is ethical because any experienced programmer could create such a tool. 

C. The behavior is not ethical because creating any kind of virus is bad. 

D. The behavior is not ethical because such.a tool could be leaked on the Internet. 

Answer:

Q3. The PRIMARY characteristic of a Distributed Denial of Service (DDoS) attack is that it 

A. exploits weak authentication to penetrate networks. 

B. can be detected with signature analysis. 

C. looks like normal network activity. 

D. is commonly confused with viruses or worms. 

Answer:

Q4. DRAG DROP 

Place in order, from BEST (1) to WORST (4), the following methods to reduce the risk of data remanence on magnetic media. 

Answer:  

Q5. During an investigation of database theft from an organization's web site, it was determined that the Structured Query Language (SQL) injection technique was used despite input validation with client-side scripting. Which of the following provides the GREATEST protection against the same attack occurring again? 

A. Encrypt communications between the servers 

B. Encrypt the web server traffic 

C. Implement server-side filtering 

D. Filter outgoing traffic at the perimeter firewall 

Answer:

Q6. Which of the following does the Encapsulating Security Payload (ESP) provide? 

A. Authorization and integrity 

B. Availability and integrity 

C. Integrity and confidentiality 

D. Authorization and confidentiality 

Answer:

Q7. What does secure authentication with logging provide? 

A. Data integrity 

B. Access accountability 

C. Encryption logging format 

D. Segregation of duties 

Answer:

Q8. Which of the following elements.MUST a compliant EU-US Safe Harbor Privacy Policy contain? 

A. An explanation of how long the data subject's collected information will be retained for and how it will be eventually disposed. 

B. An explanation of who can be contacted at the organization collecting the information if corrections are required by the data subject. 

C. An explanation of the regulatory frameworks and compliance standards the information collecting organization adheres to. 

D. An explanation of all the technologies employed by the collecting organization in gathering information on the data subject. 

Answer: B

Q9. Which of the following is a security feature of Global Systems for Mobile Communications (GSM)? 

A. It uses a Subscriber Identity Module (SIM) for authentication. 

B. It uses encrypting techniques for all communications. 

C. The radio spectrum is divided with multiple frequency carriers. 

D. The signal is difficult to read as it provides end-to-end encryption. 

Answer:

Q10. What should be the INITIAL response to Intrusion Detection System/Intrusion Prevention System (IDS/IPS) alerts? 

A. Ensure that the Incident Response Plan is available and current. 

B. Determine the traffic's initial source and block the appropriate port. 

C. Disable or disconnect suspected target and source systems. 

D. Verify the threat and determine the scope of the attack. 

Answer:

Q11. Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen? 

A. Set up a BIOS and operating system password 

B. Encrypt the virtual drive where confidential files can be stored 

C. Implement a mandatory policy in which sensitive data cannot be stored on laptops, but only on the corporate network 

D. Encrypt the entire disk and delete contents after a set number of failed access attempts 

Answer:

Q12. A business has implemented Payment Card Industry Data Security Standard (PCI-DSS) compliant handheld credit card processing on their Wireless Local Area Network.(WLAN) topology. The.network team.partitioned the WLAN to.create a private segment for credit card processing using a firewall to control device access and route traffic to the card processor on the Internet. What components are in the scope of PCI-DSS? 

A. The entire enterprise network infrastructure. 

B. The handheld devices, wireless access points and border gateway. 

C. The end devices, wireless access points, WLAN, switches, management console, and firewall. 

D. The end devices, wireless access points, WLAN, switches, management console, and Internet 

Answer:

Q13. Refer.to the information below to answer the question. 

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access. 

Which of the following solutions would have MOST likely detected the use of peer-to-peer programs when the computer was connected to the office network? 

A. Anti-virus software 

B. Intrusion Prevention System (IPS) 

C. Anti-spyware software 

D. Integrity checking software 

Answer:

Q14. What maintenance activity is responsible for defining, implementing, and testing updates to application systems? 

A. Program change control 

B. Regression testing 

C. Export exception control 

D. User acceptance testing 

Answer:

Q15. A global organization wants to implement hardware tokens as part of a multifactor authentication solution for remote access. The PRIMARY advantage of this implementation is 

A. the scalability of token enrollment. 

B. increased accountability of end users. 

C. it protects against unauthorized access. 

D. it simplifies user access administration. 

Answer:

START CISSP EXAM