CISSP Premium Bundle

CISSP Premium Bundle

Certified Information Systems Security Professional (CISSP) Certification Exam

4.5 
(4365 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 29, 2024Last update

ISC2 CISSP Free Practice Questions

Q1. The World Trade Organization's (WTO) agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) requires authors of computer software to be given the 

A. right to refuse or permit commercial rentals. 

B. right to disguise the software's geographic origin. 

C. ability to tailor security parameters based on location. 

D. ability to confirm license authenticity of.their works. 

Answer:

Q2. Copyright provides protection for which of the following? 

A. Ideas expressed in literary works 

B. A particular expression of an idea 

C. New and non-obvious inventions 

D. Discoveries of natural phenomena 

Answer:

Q3. During an investigation of database theft from an organization's web site, it was determined that the Structured Query Language (SQL) injection technique was used despite input validation with client-side scripting. Which of the following provides the GREATEST protection against the same attack occurring again? 

A. Encrypt communications between the servers 

B. Encrypt the web server traffic 

C. Implement server-side filtering 

D. Filter outgoing traffic at the perimeter firewall 

Answer:

Q4. A system has been scanned for vulnerabilities and has been found to contain a number of communication ports that have been opened without authority. To which of the following might this system have been subjected? 

A. Trojan horse 

B. Denial of Service (DoS) 

C. Spoofing 

D. Man-in-the-Middle (MITM) 

Answer:

Q5. What is the MOST important reason to configure unique user IDs? 

A. Supporting accountability 

B. Reducing authentication errors 

C. Preventing password compromise 

D. Supporting Single Sign On (SSO) 

Answer:

Q6. Refer.to the information below to answer the question. 

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles. 

When determining appropriate resource allocation, which of the following is MOST important to monitor? 

A. Number of system compromises 

B. Number of audit findings 

C. Number of staff reductions 

D. Number of additional assets 

Answer:

Q7. Which of the following is a critical factor for implementing a successful data classification program? 

A. Executive sponsorship 

B. Information security sponsorship 

C. End-user acceptance 

D. Internal audit acceptance 

Answer:

Q8. Which of the following defines the key exchange for Internet Protocol Security (IPSec)? 

A. Secure Sockets Layer (SSL) key exchange 

B. Internet Key Exchange (IKE) 

C. Security Key Exchange (SKE) 

D. Internet Control Message Protocol (ICMP) 

Answer:

Q9. An organization is designing a large enterprise-wide document repository system. They plan to have several different classification level areas with increasing levels of controls. The BEST way to ensure document confidentiality in the repository is to 

A. encrypt the contents of the repository and document any exceptions to that requirement. 

B. utilize Intrusion Detection System (IDS) set drop connections if too many requests for documents are detected. 

C. keep individuals with access to high security areas from saving those documents into lower security areas. 

D. require individuals with access to the system to sign Non-Disclosure Agreements (NDA). 

Answer:

Q10. Retaining system logs for six months or longer can be valuable for what activities?.

A. Disaster recovery and business continuity 

B. Forensics and incident response 

C. Identity and authorization management 

D. Physical and logical access control 

Answer:

Q11. An organization lacks a data retention policy. Of the following, who is the BEST person to consult for such requirement? 

A. Application Manager 

B. Database Administrator 

C. Privacy Officer 

D. Finance Manager 

Answer:

Q12. In Business Continuity Planning (BCP), what is the importance of documenting business processes? 

A. Provides senior management with decision-making tools 

B. Establishes and adopts ongoing testing and maintenance strategies 

C. Defines who will perform which functions during a disaster or emergency 

D. Provides an understanding of the organization's interdependencies 

Answer:

Q13. Application of which of the following Institute of Electrical and Electronics Engineers (IEEE) standards will prevent an unauthorized wireless device from being attached to a network? 

A. IEEE 802.1F 

B. IEEE 802.1H 

C. IEEE 802.1Q 

D. IEEE 802.1X 

Answer:

Q14. Which of the following is the BEST way to determine if a particular system is able to identify malicious software without executing it? 

A. Testing with a Botnet 

B. Testing with an EICAR file 

C. Executing a binary shellcode 

D. Run multiple antivirus programs 

Answer:

288. Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring? 

A. Cross Origin Resource Sharing (CORS) 

B. WebSockets 

C. Document Object Model (DOM) trees 

D. Web Interface Definition Language (IDL) 

Q15. Are companies legally required to report all data breaches? 

A. No, different jurisdictions have different rules. 

B. No, not if the data is encrypted. 

C. No, companies' codes of ethics don't require it. 

D. No, only if the breach had a material impact. 

Answer:

START CISSP EXAM