The Effective Cissp Practice Questions
The Effective Cissp Practice Questions
PRACTICE QUESTIONS
First Edition
__________
Wentz Wu
The Effective CISSP
Practice Questions
https://WentzWu.com/QOTD
https://WentzWu.com/CISSP
☐ Reverse reading
Browse the question in the reverse order to grasp the main idea of
the question and to catch the intuitive answer at the first
impression. Intuition triggers your powerful deep mind.
☐ Identifying Sequence
Answer options may be s equential but arranged in random order.
Being aware of this arrangement and identifying the correct
sequence helps answer the questions with "FIRST" or "MOST."
☐ Eliminating Aliens
Eliminating aliens means ruling out those options that are
apparently wrong. Select the survivor as your answer; don't rely on
selecting the so-called "correct answer."
17. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You are
developing the information security policy to build a
policy framework for related supporting policies, and
considering its objectives, scope, and roles and
responsibilities.
Which of the following is the best to be enlisted in the
policy scope?
A. Levels of data sensitivity
B. Senior management
C. Stakeholders covered by the policy
D. Confidentiality, integrity, and availability
26. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You are
concerned that the hacker can type in SQL
expressions in the login form to bypass the
authentication.
Which of the following best describes your concern?
A. Risk exposure
B. Threat event
C. Threat scenario
D. Risk profile
27. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You are
evaluating security control frameworks to mitigate
risks and enforce security.
Which of the following is least likely to be included in a
security control framework?
A. Residual risk after implementing controls
B. Audit procedure or assessment methods
C. The process to eliminate controls from baselines
D. Implementation guidance for access control
28. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. Your
bank is considering outsourcing the customer
relationship management (CRM) system to an offshore
software development vendor.
Which of the following action should your bank take
first?
A. Conduct the threat scenario analysis
B. Describe threat sources that are relevant to the
organization
C. Develop and select threat events for analysis
D. Determine applicable controls
40. You are preparing for the CISSP exam. There are
vendors spreading advertisements claiming the offer
of real exam dumps or the opportunity to get
certificates without testing.
As a CISSP aspirant, which of the following (ISC)²
Code of Ethics Canons is violated and specified in a
complaint ? Why?
A. Act honorably, honestly, justly, responsibly, and legally
B. Provide diligent and competent service to principals
C. Advance and protect the profession
D. None of the above
43. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You are
reviewing applicable legal and regulatory requirements
for compliance.
Which of the following will concern you most?
A. Procurement staff issued a contract without minimum
security requirements
B. The development team used an open-source
component with an unknown source
C. Policies are published after a new law or regulation as a
reactive response
D. Personal data is open for the data subject to update
64. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You are
preparing the data policy and considering the data
classification scheme. You prefer the classification
criteria that cover widespread concerns.
Which of the following classification criteria best
meets your requirement?
A. Sensitivity
B. Criticality
C. Business value
D. Recovery cost
87. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You are
referencing the NIST Risk Management Framework
(RMF) to determine security controls for the core
banking system.
Which of the following best describes the criteria on
which the control selection process depends?
A. The impact level of the system
B. Information types the system processes
C. The sensitivity of information the system processes
D. The value of the information the system processes
97. You were working for a law firm and tasked to evaluate
access control models for information systems. It is a
major concern that your law firm may represent both
sides in an ongoing legal case, and the information
flow between the two legal teams may result in
collusion or bias.
Which of the following is the best fit for your firm?
A. Clark-Wilson Model
B. Graham-Denning Model
C. Take-Grant Model
D. Brewer-Nash Model
101. Your company sells toys around the world. You are
developing an EC system supported by an RDBMS
and write the following SQL code to create a sales
order:
01 Begin Transaction
02 Insert Orders(Id, CustomerId, OrderDate) Values(1, 1,
'2020/08/15');
03 Insert OrderItems(Id, OrderId, ProductId, Quantity, Price)
Values(1, 1, 1, 1, 9.9);
04 Commit Transaction
243. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You
want to evaluate if security controls are implemented
correctly, operating as intended, and producing the
desired outcome.
Which of the following should you conduct?
A. Risk assessment
B. Third-party audit
C. Business impact analysis
D. Security control assessment
256. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. Your
bank is implementing an information security
management system (ISMS) compliant with ISO 27001
and undergoing a certification audit. An external
auditor is interviewing with you. In which of the
following issues is the auditor least likely to be
interested during the interview?
A. Are the roles and responsibilities assigned and
communicated
B. Is the information security policy available as
documented information
C. Are there any needs for changes to the ISMS
D. Is risk assessment conducted before business impact
analysis
258. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You are
reviewing the performance of security operations.
Which of the following is most likely out of the review
scope?
A. Development progress of the business continuity plan
B. Walkthrough result of the disaster recovery plan
C. The efficiency of the incident response
D. The validity of backup data
259. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You
developed an information security policy and put it
into effect.
Which of the following is the most effective for you to
enforce its compliance?
A. Provide more training to improve awareness and skill
levels
B. Conduct frequent audits to improve continuously
C. Develop standards, procedures, and guidelines to
support the policy
D. Collaborate with the audit department
260. You are the CISO working for a direct bank based in
Taiwan that relies entirely on internet banking. You are
collaborating with auditors to facilitate auditing
activities to ensure compliance with information
security policy.
Which of the following is least commonly adopted?
A. Employing the Delphi method
B. Interviewing with senior management
C. Reviewing data backup policy
D. Sending questionnaires to the target group
280. You learned from the news that the World Health
Organization (WHO) is closely monitoring a novel
deadly coronavirus under spreading. As a CISO, which
of the following will you do first?
A. Implement emergent update for latest antivirus
signatures
B. Conduct the exercise of the Occupant Emergency Plan
(OEP)
C. Enable the incident response plan and security incident
response team
D. Review and test the business continuity plan (BCP)