CISSP Premium Bundle

CISSP Premium Bundle

Certified Information Systems Security Professional (CISSP) Certification Exam

4.5 
(10635 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 29, 2024Last update

ISC2 CISSP Free Practice Questions

Q1. Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming? 

A. Anti-tampering 

B. Secure card reader 

C. Radio Frequency (RF) scanner 

D. Intrusion Prevention System (IPS) 

Answer:

Q2. What is the MOST effective countermeasure to a malicious code attack.against a.mobile system? 

A. Sandbox 

B. Change control 

C. Memory management 

D. Public-Key Infrastructure (PKI) 

Answer:

Q3. Refer.to the information below to answer the question. 

A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes. 

Which of the following BEST describes the access control methodology used? 

A. Least privilege 

B. Lattice Based Access Control (LBAC) 

C. Role Based Access Control (RBAC) 

D. Lightweight Directory Access Control (LDAP) 

Answer:

Q4. Refer.to the information below to answer the question. 

A new employee is given a laptop computer with full administrator access. This employee does not have a personal computer at home and has a child that uses the computer to send and receive e-mail, search the web, and use instant messaging. The organization’s Information Technology (IT) department discovers that a peer-to-peer program has been installed on the computer using the employee's access. 

Which.of.the.following.could.have.MOST.likely.prevented.the.Peer-to-Peer.(P2P).program.from.being.installed.on.the.computer? 

A. Removing employee's full access to the computer 

B. Supervising their child's use of the computer 

C. Limiting computer's access to only the employee 

D. Ensuring employee understands their business conduct guidelines 

Answer:

Q5. Which of the following is a detective access control mechanism? 

A. Log review 

B. Least privilege C. Password complexity 

D. Non-disclosure agreement 

Answer:

Q6. Which of the following is the BEST reason to review audit logs periodically? 

A. Verify they are operating properly 

B. Monitor employee productivity 

C. Identify anomalies in use patterns 

D. Meet compliance regulations 

Answer:

Q7. Which one of the following describes granularity? 

A. Maximum number of entries available in an Access Control List (ACL) 

B. Fineness to which a trusted system can authenticate users 

C. Number of violations divided by the number of total accesses 

D. Fineness to which an access control system can be adjusted 

Answer:

Q8. Which of the following is an appropriate source for test data? 

A. Production.data that is secured and maintained only in the production environment. 

B. Test data that has no similarities to production.data. 

C. Test data that is mirrored and kept up-to-date with production data. 

D. Production.data that has been.sanitized before loading into a test environment. 

Answer:

Q9. When designing a vulnerability test, which one of the following is likely to give the BEST indication of what components currently operate on the network? 

A. Topology diagrams 

B. Mapping tools 

C. Asset register 

D. Ping testing 

Answer:

Q10. Which of the following is a security limitation of File Transfer Protocol (FTP)? 

A. Passive FTP is not compatible with web browsers. 

B. Anonymous access is allowed. 

C. FTP uses Transmission Control Protocol (TCP) ports 20 and 21. 

D. Authentication is not encrypted. 

Answer:

Q11. Which of the following is a MAJOR consideration in implementing a Voice over IP (VoIP) network? 

A. Use of a unified messaging. 

B. Use of separation for the voice network. 

C. Use of Network Access Control (NAC) on switches. 

D. Use of Request for Comments (RFC) 1918 addressing. 

Answer:

Q12. An external attacker has compromised an organization's network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker's ability to gain further information? 

A. Implement packet filtering on the network firewalls 

B. Require strong authentication for administrators 

C. Install Host Based Intrusion Detection Systems (HIDS) 

D. Implement logical network segmentation at the switches 

Answer:

Q13. Which of the following is the PRIMARY.security.concern associated with the implementation of smart cards? 

A. The cards have limited memory 

B. Vendor application compatibility 

C. The cards can be misplaced 

D. Mobile code can be embedded in the card 

Answer:

Q14. Which of the following activities BEST identifies operational problems, security misconfigurations, and malicious attacks? 

A. Policy documentation review 

B. Authentication validation 

C. Periodic log reviews 

D. Interface testing 

Answer:

Q15. Which of the following provides effective management assurance for a Wireless Local Area Network (WLAN)? 

A. Maintaining an inventory of authorized Access Points (AP) and connecting devices B. Setting the radio frequency to the minimum range required 

C. Establishing a Virtual Private Network (VPN) tunnel between the WLAN client device and a VPN concentrator 

D. Verifying that all default passwords have been changed 

Answer:

START CISSP EXAM