CISSP Exam - Certified Information Systems Security Professional (CISSP)

certleader.com

Q1. Which of the following is an effective method for avoiding magnetic media data 

remanence? 

A. Degaussing 

B. Encryption 

C. Data Loss Prevention (DLP) 

D. Authentication 

Answer:

Q2. The PRIMARY purpose of a security awareness program is to 

A. ensure that everyone understands the organization's policies and procedures. 

B. communicate that access to information will be granted on a need-to-know basis. 

C. warn all users that access to all systems will be monitored on a daily basis. 

D. comply with regulations related to data and information protection. 

Answer:

Q3. Which of the following is a method used to prevent Structured Query Language (SQL) 

injection attacks? 

A. Data compression 

B. Data classification 

C. Data warehousing 

D. Data validation 

Answer:

Q4. Which of the following is the MOST beneficial to review when performing an IT audit? 

A. Audit policy 

B. Security log 

C. Security policies 

D. Configuration settings 

Answer:

Q5. What security management control is MOST often broken by collusion? 

A. Job rotation 

B. Separation of duties 

C. Least privilege model 

D. Increased monitoring 

Answer:

Q6. Which one of the following effectively obscures network addresses from external exposure when implemented on a firewall or router? 

A. Network Address Translation (NAT) 

B. Application Proxy 

C. Routing Information Protocol (RIP) Version 2 

D. Address Masking 

Answer:

Q7. A large university needs to enable student.access to university resources from their homes. Which of the following provides the BEST option for low maintenance and ease of deployment? 

A. Provide students with Internet Protocol Security (IPSec) Virtual Private Network (VPN) client software. 

B. Use Secure Sockets Layer (SSL) VPN technology. 

C. Use Secure Shell (SSH) with public/private keys. 

D. Require students to purchase home router capable of VPN. 

Answer:

Q8. Which of the following is the MAIN reason that system re-certification and re-accreditation are needed? 

A. To assist data owners in making future sensitivity and criticality determinations 

B. To assure the software development team that all security issues have been addressed 

C. To verify that security protection remains acceptable to the organizational security policy 

D. To help the security team accept or reject new systems for implementation and production 

Answer:

Q9. An internal Service Level Agreement (SLA) covering security is signed by senior managers and is in place. When should compliance to the SLA be reviewed to ensure that a good security posture is being delivered? 

A. As part of the SLA renewal process 

B. Prior to a planned security audit 

C. Immediately after a security breach 

D. At regularly scheduled meetings 

Answer:

Q10. Which of the following describes the BEST configuration management practice? 

A. After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering. 

B. After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering. 

C. The firewall rules are backed up to an air-gapped system. 

D. A baseline configuration is created and maintained for all relevant systems. 

Answer: