Cissp 6
Cissp 6
ISC2
Exam Questions CISSP
Certified Information Systems Security Professional (CISSP)
NEW QUESTION 1
- (Exam Topic 1)
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?
Answer: C
NEW QUESTION 2
- (Exam Topic 1)
Which of the following represents the GREATEST risk to data confidentiality?
Answer: C
NEW QUESTION 3
- (Exam Topic 1)
Intellectual property rights are PRIMARY concerned with which of the following?
Answer: D
NEW QUESTION 4
- (Exam Topic 2)
When implementing a data classification program, why is it important to avoid too much granularity?
Answer: A
NEW QUESTION 5
- (Exam Topic 2)
Which of the following is MOST important when assigning ownership of an asset to a department?
Answer: B
NEW QUESTION 6
- (Exam Topic 2)
Which of the following BEST describes the responsibilities of a data owner?
A. Ensuring quality and validation through periodic audits for ongoing data integrity
B. Maintaining fundamental data availability, including data storage and archiving
C. Ensuring accessibility to appropriate users, maintaining appropriate levels of data security
D. Determining the impact the information has on the mission of the organization
Answer: C
NEW QUESTION 7
- (Exam Topic 3)
Which of the following mobile code security models relies only on trust?
A. Code signing
B. Class authentication
C. Sandboxing
D. Type safety
Answer: A
NEW QUESTION 8
- (Exam Topic 3)
Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?
A. Confidentiality
B. Integrity
C. Identification
D. Availability
Answer: A
NEW QUESTION 9
- (Exam Topic 3)
The use of private and public encryption keys is fundamental in the implementation of which of the following?
A. Diffie-Hellman algorithm
B. Secure Sockets Layer (SSL)
C. Advanced Encryption Standard (AES)
D. Message Digest 5 (MD5)
Answer: A
NEW QUESTION 10
- (Exam Topic 3)
Who in the organization is accountable for classification of data information assets?
A. Data owner
B. Data architect
C. Chief Information Security Officer (CISO)
D. Chief Information Officer (CIO)
Answer: A
NEW QUESTION 10
- (Exam Topic 3)
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
A. Implementation Phase
B. Initialization Phase
C. Cancellation Phase
D. Issued Phase
Answer: D
NEW QUESTION 13
- (Exam Topic 4)
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
A. Packet filtering
B. Port services filtering
C. Content filtering
D. Application access control
Answer: A
NEW QUESTION 14
- (Exam Topic 5)
A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is
the BEST solution for the manufacturing organization?
Answer: C
NEW QUESTION 18
- (Exam Topic 7)
Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?
Answer: D
NEW QUESTION 20
- (Exam Topic 7)
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24
hours?
A. Warm site
B. Hot site
C. Mirror site
D. Cold site
Answer: A
NEW QUESTION 23
- (Exam Topic 7)
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST
probable cause?
Answer: D
NEW QUESTION 28
- (Exam Topic 7)
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
A. Walkthrough
B. Simulation
C. Parallel
D. White box
Answer: B
NEW QUESTION 30
- (Exam Topic 8)
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
A. After the system preliminary design has been developed and the data security categorization has been performed
B. After the vulnerability analysis has been performed and before the system detailed design begins
C. After the system preliminary design has been developed and before the data security categorization begins
D. After the business functional analysis and the data security categorization have been performed
Answer: C
NEW QUESTION 34
- (Exam Topic 8)
The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle
(SDLC)?
Answer: A
Explanation:
Reference https://online.concordiA.edu/computer-science/system-development-life-cycle-phases/
NEW QUESTION 37
- (Exam Topic 9)
Which of the following is a method used to prevent Structured Query Language (SQL) injection attacks?
A. Data compression
B. Data classification
C. Data warehousing
D. Data validation
Answer: D
NEW QUESTION 42
- (Exam Topic 9)
Which of the following is ensured when hashing files during chain of custody handling?
A. Availability
B. Accountability
C. Integrity
D. Non-repudiation
Answer: C
NEW QUESTION 43
- (Exam Topic 9)
Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review?
Answer: C
NEW QUESTION 45
- (Exam Topic 9)
To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media
being discarded?
A. Multiple-pass overwriting
B. Degaussing
C. High-level formatting
D. Physical destruction
Answer: C
NEW QUESTION 46
- (Exam Topic 9)
Which one of the following is a threat related to the use of web-based client side input validation?
A. Users would be able to alter the input after validation has occurred
B. The web server would not be able to validate the input after transmission
C. The client system could receive invalid input from the web server
D. The web server would not be able to receive invalid input from the client
Answer: A
NEW QUESTION 50
- (Exam Topic 9)
A vulnerability test on an Information System (IS) is conducted to
Answer: C
NEW QUESTION 53
- (Exam Topic 9)
An organization allows ping traffic into and out of their network. An attacker has installed a program on the network that uses the payload portion of the ping packet
to move data into and out of the network. What type of attack has the organization experienced?
A. Data leakage
B. Unfiltered channel
C. Data emanation
D. Covert channel
Answer: D
NEW QUESTION 55
- (Exam Topic 9)
Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming?
A. Anti-tampering
B. Secure card reader
C. Radio Frequency (RF) scanner
D. Intrusion Prevention System (IPS)
Answer: A
NEW QUESTION 56
- (Exam Topic 9)
What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?
A. Signature
B. Inference
C. Induction
D. Heuristic
Answer: D
NEW QUESTION 58
- (Exam Topic 9)
Which one of the following transmission media is MOST effective in preventing data interception?
A. Microwave
B. Twisted-pair
C. Fiber optic
D. Coaxial cable
Answer: C
NEW QUESTION 60
- (Exam Topic 9)
Which one of the following considerations has the LEAST impact when considering transmission security?
A. Network availability
B. Data integrity
C. Network bandwidth
D. Node locations
Answer: C
NEW QUESTION 62
- (Exam Topic 9)
The stringency of an Information Technology (IT) security assessment will be determined by the
Answer: C
NEW QUESTION 66
- (Exam Topic 9)
Which of the following is considered best practice for preventing e-mail spoofing?
A. Spam filtering
B. Cryptographic signature
C. Uniform Resource Locator (URL) filtering
D. Reverse Domain Name Service (DNS) lookup
Answer: B
NEW QUESTION 71
- (Exam Topic 9)
Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to what?
Answer: D
NEW QUESTION 76
- (Exam Topic 9)
An advantage of link encryption in a communications network is that it
Answer: D
NEW QUESTION 79
- (Exam Topic 9)
Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?
Answer: A
NEW QUESTION 84
- (Exam Topic 9)
As one component of a physical security system, an Electronic Access Control (EAC) token is BEST known for its ability to
Answer: A
NEW QUESTION 88
- (Exam Topic 9)
What security management control is MOST often broken by collusion?
A. Job rotation
B. Separation of duties
C. Least privilege model
D. Increased monitoring
Answer: B
NEW QUESTION 91
- (Exam Topic 9)
When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include
Answer: D
NEW QUESTION 92
- (Exam Topic 9)
Which of the following does the Encapsulating Security Payload (ESP) provide?
Answer: C
NEW QUESTION 96
- (Exam Topic 9)
Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are
admitted?
Answer: A
NEW QUESTION 97
- (Exam Topic 9)
An organization is selecting a service provider to assist in the consolidation of multiple computing sites including development, implementation and ongoing
support of various computer systems. Which of the following MUST be verified by the Information Security Department?
A. The service provider's policies are consistent with ISO/IEC27001 and there is evidence that the service provider is following those policies.
B. The service provider will segregate the data within its systems and ensure that each region's policies are met.
C. The service provider will impose controls and protections that meet or exceed the current systemscontrols and produce audit logs as verification.
D. The service provider's policies can meet the requirements imposed by the new environment even if they differ from the organization's current policies.
Answer: D
NEW QUESTION 98
- (Exam Topic 9)
Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?
Answer: D
NEW QUESTION 99
- (Exam Topic 9)
The use of strong authentication, the encryption of Personally Identifiable Information (PII) on database servers, application security reviews, and the encryption of
data transmitted across networks provide
A. data integrity.
B. defense in depth.
C. data availability.
D. non-repudiation.
Answer: B
A. Cryptographic checksums
B. Version numbering
C. Automatic updates
D. Vendor assurance
Answer: A
Answer: D
Answer: D
Answer: C
- (Exam Topic 9)
What principle requires that changes to the plaintext affect many parts of the ciphertext?
A. Diffusion
B. Encapsulation
C. Obfuscation
D. Permutation
Answer: A
A. system software.
B. system hardware.
C. application software.
D. network hardware.
Answer: A
Answer: B
Answer: C
Answer: A
A. Production data that is secured and maintained only in the production environment.
B. Test data that has no similarities to production datA.
C. Test data that is mirrored and kept up-to-date with production datA.
D. Production data that has been sanitized before loading into a test environment.
Answer: D
Answer: B
Answer: A
A. Encryption routines
B. Random number generator
C. Obfuscated code
D. Botnet command and control
Answer: C
A. Technical management
B. Change control board
C. System operations
D. System users
Answer: B
A. A dictionary attack
B. A Denial of Service (DoS) attack
C. A spoofing attack
D. A backdoor installation
Answer: A
A. Degaussing
B. Encryption
C. Data Loss Prevention (DLP)
D. Authentication
Answer: A
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: B
A. Trojan horse
B. Denial of Service (DoS)
C. Spoofing
D. Man-in-the-Middle (MITM)
Answer: A
Answer: C
Answer: A
A. The behavior is ethical because the tool will be used to create a better virus scanner.
B. The behavior is ethical because any experienced programmer could create such a tool.
C. The behavior is not ethical because creating any kind of virus is bad.
D. The behavior is not ethical because such a tool could be leaked on the Internet.
Answer: A
Answer: B
A. monthly.
B. quarterly.
C. annually.
D. bi-annually.
Answer: C
A. Requirements Analysis
B. Development and Deployment
C. Production Operations
D. Utilization Support
Answer: A
Answer: C
A. Audit policy
B. Security log
C. Security policies
D. Configuration settings
Answer: C
Answer: A
Answer: D
Answer: A
A. Data integrity
B. Access accountability
C. Encryption logging format
D. Segregation of duties
Answer: B
A. Availability
B. Integrity
C. Accountability
D. Confidentiality
Answer: D
A. Policy database
B. Digital signature
C. Policy decision point
D. Policy enforcement point
Answer: D
A. Data access
B. Data backup
C. Data recovery
D. Data disposal
Answer: D
Answer: D
Answer: C
Answer: B
Answer: A
C. The end devices, wireless access points, WLAN, switches, management console, and firewall.
D. The end devices, wireless access points, WLAN, switches, management console, and Internet
Answer: C
Answer: A
A. Forms-based authentication
B. Digest authentication
C. Basic authentication
D. Self-registration
Answer: B
Answer: C
A. Log review
B. Least privilege
C. Password complexity
D. Non-disclosure agreement
Answer: A
A. Plaintext
B. Brute force
C. Power analysis
D. Man-in-the-middle (MITM)
Answer: C
Answer: D
Answer: A
Answer: B
A. Severity of risk
B. Complexity of strategy
C. Frequency of incidents
D. Ongoing awareness
Answer: A
A. Least privilege
B. Lattice Based Access Control (LBAC)
C. Role Based Access Control (RBAC)
D. Lightweight Directory Access Control (LDAP)
Answer: C
Answer: D
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: C
In a Bell-LaPadula system, which user has the MOST restrictions when writing data to any of the four files?
A. User A
B. User B
C. User C
D. User D
Answer: D
A. Hash functions
B. Data segregation
C. File system permissions
D. Non-repudiation controls
Answer: B
Answer: D
A. audit findings.
B. risk elimination.
C. audit requirements.
D. customer satisfaction.
Answer: A
Answer: B
A. Supporting accountability
B. Reducing authentication errors
C. Preventing password compromise
D. Supporting Single Sign On (SSO)
Answer: A
A. Knurling
B. Grinding
C. Shredding
D. Degaussing
Answer: C
Answer: B
A. ISO 9000
B. ISO 20121
C. ISO 26000
D. ISO 27001
Answer: D
Answer: D
A. User error
B. Suspected tampering
C. Accurate identification
D. Unsuccessful identification
Answer: B
A. A document that expresses an implementation independent set of security requirements for an IT product that meets specific consumer needs.
B. A document that is used to develop an IT security product from its security requirements definition.
C. A document that expresses an implementation dependent set of security requirements which contains only the security functional requirements.
D. A document that represents evaluated products where there is a one-to-one correspondence between a PP and a Security Target (ST).
Answer: A
Answer: A
Answer: C
A. The change must be given priority at the next meeting of the change control board.
B. Testing and approvals must be performed quickly.
C. The change must be performed immediately and then submitted to the change board.
D. The change is performed and a notation is made in the system log.
Answer: B
Answer: C
Answer: A
Answer: A
Answer: B
sensitive documents?
Answer: A
A. Application Manager
B. Database Administrator
C. Privacy Officer
D. Finance Manager
Answer: C
Answer: A
A. After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.
B. After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.
C. The firewall rules are backed up to an air-gapped system.
D. A baseline configuration is created and maintained for all relevant systems.
Answer: D
A. Logging configurations
B. Transaction log files
C. User account configurations
D. Access control lists (ACL)
Answer: B
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Federation
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Trust
The protocol used for issuing security tokens is based on WS-Trust. WS-Trust is a Web service specification that builds on WS-Security. It describes a protocol
used for issuance, exchange, and validation of security tokens. WS-Trust provides a solution for interoperability by defining a protocol for issuing and exchanging
security tokens, based on token format, namespace, or trust boundaries.
Reference: https://msdn.microsoft.com/en-us/library/ff650503.aspx
A. Data Redaction
B. Data Minimization
C. Data Encryption
D. Data Storage
Answer: B
A. Integrity
B. Confidentiality
C. Availability
D. Access Control
Answer: A
A. An access token
B. A username and password
C. A username
D. A password
Answer: A
Answer: D
Answer: A
Answer: B
Answer: D
A. After the system preliminary design has been developed and the data security categorization has been performed
B. After the business functional analysis and the data security categorization have been performed
C. After the vulnerability analysis has been performed and before the system detailed design begins
D. After the system preliminary design has been developed and before the data security categorization begins
Answer: B
Answer: B
Answer: C
Answer: C
A. Application Layer
B. Physical Layer
C. Data-Link Layer
D. Network Layer
Answer: B
Answer: B
Answer: A
A. Retention
B. Reporting
C. Recovery
D. Remediation
Answer: A
Answer: A
A. Transport
B. Data link
C. Network
D. Application
Answer: D
Answer: B
Answer: A
A. Transference
B. Covert channel
C. Bleeding
D. Cross-talk
Answer: D
Answer: B
Answer: D
A. Job rotation
B. Separation of duties
C. Least privilege
D. Mandatory vacations
Answer: B
A. Provision
B. Approve
C. Request
D. Review
Answer: A
A. Property book
B. Chain of custody form
C. Search warrant return
D. Evidence tag
Answer: D
A. Low-level formatting
B. Secure-grade overwrite erasure
C. Cryptographic erasure
D. Drive degaussing
Answer: B
Answer: B
Answer: C
Answer: C
Answer: B
Answer: A
Answer: C
Answer: C
Answer: C
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: D
A. Management support
B. Consideration of organizational need
C. Technology used for delivery
D. Target audience
Answer: B
Answer: B
Answer: A
Answer: D
Answer: B
A. Password encryption
B. File encryption
C. Source library control
D. File authentication
Answer:
A. Morale
B. Reputation
C. Equipment
D. Information
Answer: C
Answer: C
Explanation:
Section: Security Assessment and Testing
Answer: A
Answer: A
Answer: B
A. Application authentication
B. Input validation
C. Digital signing
D. Device encryption
Answer: C
Answer: C
Answer: D
Answer: B
A. Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
B. Disable the broadcast of the Service Set Identifier (SSID) name
C. Change the name of the Service Set Identifier (SSID) to a random value not associated with theorganization
D. Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
Answer: D
A. To assure management that changes to the Information Technology (IT) infrastructure are necessary
B. To identify the changes that may be made to the Information Technology (IT) infrastructure
C. To verify that changes to the Information Technology (IT) infrastructure are approved
D. To determine the necessary for implementing modifications to the Information Technology (IT) infrastructure
Answer: C
Explanation:
Section: Security Operations
A. Implementation
B. Initiation
C. Review
D. Development
Answer: A
A. The IDS can detect failed administrator logon attempts from servers.
B. The IDS can increase the number of packets to analyze.
C. The firewall can increase the number of packets to analyze.
D. The firewall can detect failed administrator login attempts from servers
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: B
A. Provisioning
B. Review
C. Approval
D. Revocation
Answer: B
Answer: B
A. Awareness activities should be used to focus on security concerns and respond to those concerns accordingly
B. Awareness is not an activity or part of the training but rather a state of persistence to support the program
C. Awareness is trainin
D. The purpose of awareness presentations is to broaden attention of security.
E. Awareness is not trainin
F. The purpose of awareness presentation is simply to focus attention on security.
Answer: C
Answer: C
Explanation:
Section: Security Operations
Answer: D
Answer: A
Answer: D
Answer: B
Answer: A
A. Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
B. Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
C. Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
D. Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
Answer: B
Answer: C
Answer: B
A. Mutual authentication
B. Server authentication
C. User authentication
D. Streaming ciphertext data
Answer: C
A. Known-plaintext attack
B. Denial of Service (DoS)
C. Cookie manipulation
D. Structured Query Language (SQL) injection
Answer: D
Explanation:
Section: Security Assessment and Testing
Answer: B
Explanation:
Section: Security Operations
Answer: A
Explanation:
Section: Security Assessment and Testing
Answer: C
Answer: A
About Exambible
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA,
CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the
candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have
got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could
not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another
exam of your claim, ABSOLUTELY FREE!
NEW QUESTION 1
- (Exam Topic 1)
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?
Answer: C
NEW QUESTION 2
- (Exam Topic 1)
Which of the following represents the GREATEST risk to data confidentiality?
Answer: C
NEW QUESTION 3
- (Exam Topic 1)
Intellectual property rights are PRIMARY concerned with which of the following?
Answer: D
NEW QUESTION 4
- (Exam Topic 2)
When implementing a data classification program, why is it important to avoid too much granularity?
Answer: A
NEW QUESTION 5
- (Exam Topic 2)
Which of the following is MOST important when assigning ownership of an asset to a department?
Answer: B
NEW QUESTION 6
- (Exam Topic 2)
Which of the following BEST describes the responsibilities of a data owner?
A. Ensuring quality and validation through periodic audits for ongoing data integrity
B. Maintaining fundamental data availability, including data storage and archiving
C. Ensuring accessibility to appropriate users, maintaining appropriate levels of data security
D. Determining the impact the information has on the mission of the organization
Answer: C
NEW QUESTION 7
- (Exam Topic 3)
Which of the following mobile code security models relies only on trust?
A. Code signing
B. Class authentication
C. Sandboxing
D. Type safety
Answer: A
NEW QUESTION 8
- (Exam Topic 3)
Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?
A. Confidentiality
B. Integrity
C. Identification
D. Availability
Answer: A
NEW QUESTION 9
- (Exam Topic 3)
The use of private and public encryption keys is fundamental in the implementation of which of the following?
A. Diffie-Hellman algorithm
B. Secure Sockets Layer (SSL)
C. Advanced Encryption Standard (AES)
D. Message Digest 5 (MD5)
Answer: A
NEW QUESTION 10
- (Exam Topic 3)
Who in the organization is accountable for classification of data information assets?
A. Data owner
B. Data architect
C. Chief Information Security Officer (CISO)
D. Chief Information Officer (CIO)
Answer: A
NEW QUESTION 10
- (Exam Topic 3)
What is the second phase of Public Key Infrastructure (PKI) key/certificate life-cycle management?
A. Implementation Phase
B. Initialization Phase
C. Cancellation Phase
D. Issued Phase
Answer: D
NEW QUESTION 13
- (Exam Topic 4)
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
A. Packet filtering
B. Port services filtering
C. Content filtering
D. Application access control
Answer: A
NEW QUESTION 14
- (Exam Topic 5)
A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is
the BEST solution for the manufacturing organization?
Answer: C
NEW QUESTION 18
- (Exam Topic 7)
Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?
Answer: D
NEW QUESTION 20
- (Exam Topic 7)
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24
hours?
A. Warm site
B. Hot site
C. Mirror site
D. Cold site
Answer: A
NEW QUESTION 23
- (Exam Topic 7)
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST
probable cause?
Answer: D
NEW QUESTION 28
- (Exam Topic 7)
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
A. Walkthrough
B. Simulation
C. Parallel
D. White box
Answer: B
NEW QUESTION 30
- (Exam Topic 8)
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
A. After the system preliminary design has been developed and the data security categorization has been performed
B. After the vulnerability analysis has been performed and before the system detailed design begins
C. After the system preliminary design has been developed and before the data security categorization begins
D. After the business functional analysis and the data security categorization have been performed
Answer: C
NEW QUESTION 34
- (Exam Topic 8)
The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle
(SDLC)?
Answer: A
Explanation:
Reference https://online.concordiA.edu/computer-science/system-development-life-cycle-phases/
NEW QUESTION 37
- (Exam Topic 9)
Which of the following is a method used to prevent Structured Query Language (SQL) injection attacks?
A. Data compression
B. Data classification
C. Data warehousing
D. Data validation
Answer: D
NEW QUESTION 42
- (Exam Topic 9)
Which of the following is ensured when hashing files during chain of custody handling?
A. Availability
B. Accountability
C. Integrity
D. Non-repudiation
Answer: C
NEW QUESTION 43
- (Exam Topic 9)
Which of the following is a limitation of the Common Vulnerability Scoring System (CVSS) as it relates to conducting code review?
Answer: C
NEW QUESTION 45
- (Exam Topic 9)
To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media
being discarded?
A. Multiple-pass overwriting
B. Degaussing
C. High-level formatting
D. Physical destruction
Answer: C
NEW QUESTION 46
- (Exam Topic 9)
Which one of the following is a threat related to the use of web-based client side input validation?
A. Users would be able to alter the input after validation has occurred
B. The web server would not be able to validate the input after transmission
C. The client system could receive invalid input from the web server
D. The web server would not be able to receive invalid input from the client
Answer: A
NEW QUESTION 50
- (Exam Topic 9)
A vulnerability test on an Information System (IS) is conducted to
Answer: C
NEW QUESTION 53
- (Exam Topic 9)
An organization allows ping traffic into and out of their network. An attacker has installed a program on the network that uses the payload portion of the ping packet
to move data into and out of the network. What type of attack has the organization experienced?
A. Data leakage
B. Unfiltered channel
C. Data emanation
D. Covert channel
Answer: D
NEW QUESTION 55
- (Exam Topic 9)
Which of the following is a physical security control that protects Automated Teller Machines (ATM) from skimming?
A. Anti-tampering
B. Secure card reader
C. Radio Frequency (RF) scanner
D. Intrusion Prevention System (IPS)
Answer: A
NEW QUESTION 56
- (Exam Topic 9)
What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?
A. Signature
B. Inference
C. Induction
D. Heuristic
Answer: D
NEW QUESTION 58
- (Exam Topic 9)
Which one of the following transmission media is MOST effective in preventing data interception?
A. Microwave
B. Twisted-pair
C. Fiber optic
D. Coaxial cable
Answer: C
NEW QUESTION 60
- (Exam Topic 9)
Which one of the following considerations has the LEAST impact when considering transmission security?
A. Network availability
B. Data integrity
C. Network bandwidth
D. Node locations
Answer: C
NEW QUESTION 62
- (Exam Topic 9)
The stringency of an Information Technology (IT) security assessment will be determined by the
Answer: C
NEW QUESTION 66
- (Exam Topic 9)
Which of the following is considered best practice for preventing e-mail spoofing?
A. Spam filtering
B. Cryptographic signature
C. Uniform Resource Locator (URL) filtering
D. Reverse Domain Name Service (DNS) lookup
Answer: B
NEW QUESTION 71
- (Exam Topic 9)
Including a Trusted Platform Module (TPM) in the design of a computer system is an example of a technique to what?
Answer: D
NEW QUESTION 76
- (Exam Topic 9)
An advantage of link encryption in a communications network is that it
Answer: D
NEW QUESTION 79
- (Exam Topic 9)
Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?
Answer: A
NEW QUESTION 84
- (Exam Topic 9)
As one component of a physical security system, an Electronic Access Control (EAC) token is BEST known for its ability to
Answer: A
NEW QUESTION 88
- (Exam Topic 9)
What security management control is MOST often broken by collusion?
A. Job rotation
B. Separation of duties
C. Least privilege model
D. Increased monitoring
Answer: B
NEW QUESTION 91
- (Exam Topic 9)
When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include
Answer: D
NEW QUESTION 92
- (Exam Topic 9)
Which of the following does the Encapsulating Security Payload (ESP) provide?
Answer: C
NEW QUESTION 96
- (Exam Topic 9)
Which one of the following is the MOST important in designing a biometric access system if it is essential that no one other than authorized individuals are
admitted?
Answer: A
NEW QUESTION 97
- (Exam Topic 9)
An organization is selecting a service provider to assist in the consolidation of multiple computing sites including development, implementation and ongoing
support of various computer systems. Which of the following MUST be verified by the Information Security Department?
A. The service provider's policies are consistent with ISO/IEC27001 and there is evidence that the service provider is following those policies.
B. The service provider will segregate the data within its systems and ensure that each region's policies are met.
C. The service provider will impose controls and protections that meet or exceed the current systemscontrols and produce audit logs as verification.
D. The service provider's policies can meet the requirements imposed by the new environment even if they differ from the organization's current policies.
Answer: D
NEW QUESTION 98
- (Exam Topic 9)
Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?
Answer: D
NEW QUESTION 99
- (Exam Topic 9)
The use of strong authentication, the encryption of Personally Identifiable Information (PII) on database servers, application security reviews, and the encryption of
data transmitted across networks provide
A. data integrity.
B. defense in depth.
C. data availability.
D. non-repudiation.
Answer: B
A. Cryptographic checksums
B. Version numbering
C. Automatic updates
D. Vendor assurance
Answer: A
Answer: D
Answer: D
Answer: C
- (Exam Topic 9)
What principle requires that changes to the plaintext affect many parts of the ciphertext?
A. Diffusion
B. Encapsulation
C. Obfuscation
D. Permutation
Answer: A
A. system software.
B. system hardware.
C. application software.
D. network hardware.
Answer: A
Answer: B
Answer: C
Answer: A
A. Production data that is secured and maintained only in the production environment.
B. Test data that has no similarities to production datA.
C. Test data that is mirrored and kept up-to-date with production datA.
D. Production data that has been sanitized before loading into a test environment.
Answer: D
Answer: B
Answer: A
A. Encryption routines
B. Random number generator
C. Obfuscated code
D. Botnet command and control
Answer: C
A. Technical management
B. Change control board
C. System operations
D. System users
Answer: B
A. A dictionary attack
B. A Denial of Service (DoS) attack
C. A spoofing attack
D. A backdoor installation
Answer: A
A. Degaussing
B. Encryption
C. Data Loss Prevention (DLP)
D. Authentication
Answer: A
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: B
A. Trojan horse
B. Denial of Service (DoS)
C. Spoofing
D. Man-in-the-Middle (MITM)
Answer: A
Answer: C
Answer: A
A. The behavior is ethical because the tool will be used to create a better virus scanner.
B. The behavior is ethical because any experienced programmer could create such a tool.
C. The behavior is not ethical because creating any kind of virus is bad.
D. The behavior is not ethical because such a tool could be leaked on the Internet.
Answer: A
Answer: B
A. monthly.
B. quarterly.
C. annually.
D. bi-annually.
Answer: C
A. Requirements Analysis
B. Development and Deployment
C. Production Operations
D. Utilization Support
Answer: A
Answer: C
A. Audit policy
B. Security log
C. Security policies
D. Configuration settings
Answer: C
Answer: A
Answer: D
Answer: A
A. Data integrity
B. Access accountability
C. Encryption logging format
D. Segregation of duties
Answer: B
A. Availability
B. Integrity
C. Accountability
D. Confidentiality
Answer: D
A. Policy database
B. Digital signature
C. Policy decision point
D. Policy enforcement point
Answer: D
A. Data access
B. Data backup
C. Data recovery
D. Data disposal
Answer: D
Answer: D
Answer: C
Answer: B
Answer: A
C. The end devices, wireless access points, WLAN, switches, management console, and firewall.
D. The end devices, wireless access points, WLAN, switches, management console, and Internet
Answer: C
Answer: A
A. Forms-based authentication
B. Digest authentication
C. Basic authentication
D. Self-registration
Answer: B
Answer: C
A. Log review
B. Least privilege
C. Password complexity
D. Non-disclosure agreement
Answer: A
A. Plaintext
B. Brute force
C. Power analysis
D. Man-in-the-middle (MITM)
Answer: C
Answer: D
Answer: A
Answer: B
A. Severity of risk
B. Complexity of strategy
C. Frequency of incidents
D. Ongoing awareness
Answer: A
A. Least privilege
B. Lattice Based Access Control (LBAC)
C. Role Based Access Control (RBAC)
D. Lightweight Directory Access Control (LDAP)
Answer: C
Answer: D
Answer: B
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: C
In a Bell-LaPadula system, which user has the MOST restrictions when writing data to any of the four files?
A. User A
B. User B
C. User C
D. User D
Answer: D
A. Hash functions
B. Data segregation
C. File system permissions
D. Non-repudiation controls
Answer: B
Answer: D
A. audit findings.
B. risk elimination.
C. audit requirements.
D. customer satisfaction.
Answer: A
Answer: B
A. Supporting accountability
B. Reducing authentication errors
C. Preventing password compromise
D. Supporting Single Sign On (SSO)
Answer: A
A. Knurling
B. Grinding
C. Shredding
D. Degaussing
Answer: C
Answer: B
A. ISO 9000
B. ISO 20121
C. ISO 26000
D. ISO 27001
Answer: D
Answer: D
A. User error
B. Suspected tampering
C. Accurate identification
D. Unsuccessful identification
Answer: B
A. A document that expresses an implementation independent set of security requirements for an IT product that meets specific consumer needs.
B. A document that is used to develop an IT security product from its security requirements definition.
C. A document that expresses an implementation dependent set of security requirements which contains only the security functional requirements.
D. A document that represents evaluated products where there is a one-to-one correspondence between a PP and a Security Target (ST).
Answer: A
Answer: A
Answer: C
A. The change must be given priority at the next meeting of the change control board.
B. Testing and approvals must be performed quickly.
C. The change must be performed immediately and then submitted to the change board.
D. The change is performed and a notation is made in the system log.
Answer: B
Answer: C
Answer: A
Answer: A
Answer: B
sensitive documents?
Answer: A
A. Application Manager
B. Database Administrator
C. Privacy Officer
D. Finance Manager
Answer: C
Answer: A
A. After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.
B. After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.
C. The firewall rules are backed up to an air-gapped system.
D. A baseline configuration is created and maintained for all relevant systems.
Answer: D
A. Logging configurations
B. Transaction log files
C. User account configurations
D. Access control lists (ACL)
Answer: B
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Federation
Reference: Java Web Services: Up and Running” By Martin Kalin page 228
A. Mastered
B. Not Mastered
Answer: A
Explanation:
WS-Trust
The protocol used for issuing security tokens is based on WS-Trust. WS-Trust is a Web service specification that builds on WS-Security. It describes a protocol
used for issuance, exchange, and validation of security tokens. WS-Trust provides a solution for interoperability by defining a protocol for issuing and exchanging
security tokens, based on token format, namespace, or trust boundaries.
Reference: https://msdn.microsoft.com/en-us/library/ff650503.aspx
A. Data Redaction
B. Data Minimization
C. Data Encryption
D. Data Storage
Answer: B
A. Integrity
B. Confidentiality
C. Availability
D. Access Control
Answer: A
A. An access token
B. A username and password
C. A username
D. A password
Answer: A
Answer: D
Answer: A
Answer: B
Answer: D
A. After the system preliminary design has been developed and the data security categorization has been performed
B. After the business functional analysis and the data security categorization have been performed
C. After the vulnerability analysis has been performed and before the system detailed design begins
D. After the system preliminary design has been developed and before the data security categorization begins
Answer: B
Answer: B
Answer: C
Answer: C
A. Application Layer
B. Physical Layer
C. Data-Link Layer
D. Network Layer
Answer: B
Answer: B
Answer: A
A. Retention
B. Reporting
C. Recovery
D. Remediation
Answer: A
Answer: A
A. Transport
B. Data link
C. Network
D. Application
Answer: D
Answer: B
Answer: A
A. Transference
B. Covert channel
C. Bleeding
D. Cross-talk
Answer: D
Answer: B
Answer: D
A. Job rotation
B. Separation of duties
C. Least privilege
D. Mandatory vacations
Answer: B
A. Provision
B. Approve
C. Request
D. Review
Answer: A
A. Property book
B. Chain of custody form
C. Search warrant return
D. Evidence tag
Answer: D
A. Low-level formatting
B. Secure-grade overwrite erasure
C. Cryptographic erasure
D. Drive degaussing
Answer: B
Answer: B
Answer: C
Answer: C
Answer: B
Answer: A
Answer: C
Answer: C
Answer: C
A. Topology diagrams
B. Mapping tools
C. Asset register
D. Ping testing
Answer: D
A. Management support
B. Consideration of organizational need
C. Technology used for delivery
D. Target audience
Answer: B
Answer: B
Answer: A
Answer: D
Answer: B
A. Password encryption
B. File encryption
C. Source library control
D. File authentication
Answer:
A. Morale
B. Reputation
C. Equipment
D. Information
Answer: C
Answer: C
Explanation:
Section: Security Assessment and Testing
Answer: A
Answer: A
Answer: B
A. Application authentication
B. Input validation
C. Digital signing
D. Device encryption
Answer: C
Answer: C
Answer: D
Answer: B
A. Enable Wi-Fi Protected Access 2 (WPA2) encryption on the wireless access point
B. Disable the broadcast of the Service Set Identifier (SSID) name
C. Change the name of the Service Set Identifier (SSID) to a random value not associated with theorganization
D. Create Access Control Lists (ACL) based on Media Access Control (MAC) addresses
Answer: D
A. To assure management that changes to the Information Technology (IT) infrastructure are necessary
B. To identify the changes that may be made to the Information Technology (IT) infrastructure
C. To verify that changes to the Information Technology (IT) infrastructure are approved
D. To determine the necessary for implementing modifications to the Information Technology (IT) infrastructure
Answer: C
Explanation:
Section: Security Operations
A. Implementation
B. Initiation
C. Review
D. Development
Answer: A
A. The IDS can detect failed administrator logon attempts from servers.
B. The IDS can increase the number of packets to analyze.
C. The firewall can increase the number of packets to analyze.
D. The firewall can detect failed administrator login attempts from servers
Answer: A
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Answer: B
A. Provisioning
B. Review
C. Approval
D. Revocation
Answer: B
Answer: B
A. Awareness activities should be used to focus on security concerns and respond to those concerns accordingly
B. Awareness is not an activity or part of the training but rather a state of persistence to support the program
C. Awareness is trainin
D. The purpose of awareness presentations is to broaden attention of security.
E. Awareness is not trainin
F. The purpose of awareness presentation is simply to focus attention on security.
Answer: C
Answer: C
Explanation:
Section: Security Operations
Answer: D
Answer: A
Answer: D
Answer: B
Answer: A
A. Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state
B. Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections
C. Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests
D. Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP) connections
Answer: B
Answer: C
Answer: B
A. Mutual authentication
B. Server authentication
C. User authentication
D. Streaming ciphertext data
Answer: C
A. Known-plaintext attack
B. Denial of Service (DoS)
C. Cookie manipulation
D. Structured Query Language (SQL) injection
Answer: D
Explanation:
Section: Security Assessment and Testing
Answer: B
Explanation:
Section: Security Operations
Answer: A
Explanation:
Section: Security Assessment and Testing
Answer: C
Answer: A
Relate Links
https://www.exambible.com/CISSP-exam/
Contact us
We are proud of our high-quality customer service, which serves you around the clock 24/7.
Viste - https://www.exambible.com/