CISSP Exam - Certified Information Systems Security Professional (CISSP)

certleader.com

Q1. In Disaster Recovery (DR) and business continuity training, which BEST describes a functional drill? 

A. A full-scale simulation of an emergency and the subsequent response functions 

B. A specific test by response teams of individual emergency response functions 

C. A functional evacuation of personnel 

D. An activation of the backup site 

Answer:

Q2. Two companies wish to share electronic inventory and purchase orders in a supplier and client relationship. What is the BEST security solution for them? 

A. Write a Service Level Agreement (SLA) for the two companies. 

B. Set up a Virtual Private Network (VPN) between the two companies. 

C. Configure a firewall at the perimeter of each of the two companies. 

D. Establish a File Transfer Protocol (FTP) connection between the two companies. 

Answer:

Q3. When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined? 

A. After the system preliminary design has been developed and.the data security categorization has been performed 

B. After the business functional analysis and the data security categorization have been performed 

C. After the vulnerability analysis has been performed and before the system detailed design begins 

D. After the system preliminary design has been developed and before.the.data security categorization begins 

Answer:

Q4. Which of the following is the BEST way to determine if a particular system is able to identify malicious software without executing it? 

A. Testing with a Botnet 

B. Testing with an EICAR file 

C. Executing a binary shellcode 

D. Run multiple antivirus programs 

Answer:

288. Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring? 

A. Cross Origin Resource Sharing (CORS) 

B. WebSockets 

C. Document Object Model (DOM) trees 

D. Web Interface Definition Language (IDL) 

Q5. Which of the following could elicit a.Denial of.Service (DoS).attack against a credential management system? 

A. Delayed revocation or destruction of credentials 

B. Modification of Certificate Revocation List 

C. Unauthorized renewal or re-issuance 

D. Token use after decommissioning 

Answer:

Q6. Refer.to the information below to answer the question. 

During the investigation of a security incident, it is determined that an unauthorized individual accessed a system which hosts a database containing financial information. 

If it is discovered that large quantities of information have been copied by the unauthorized individual, what attribute of the data has been compromised? 

A. Availability 

B. Integrity 

C. Accountability 

D. Confidentiality 

Answer:

Q7. HOTSPOT 

Which Web Services Security (WS-Security) specification.negotiates.how security tokens will be issued, renewed and validated? Click on the correct specification in the image below. 

Answer:  

Q8. When transmitting information over public networks, the decision to encrypt it should be based on 

A. the estimated monetary value of the information. 

B. whether there are transient nodes relaying the transmission. 

C. the level of confidentiality of the information. 

D. the volume of the information. 

Answer:

Q9. Which of the following statements is TRUE of black box testing? 

A. Only the functional specifications are known to the test planner. 

B. Only the source code and the design documents are known to the test planner. 

C. Only the source code and functional specifications are known to the test planner. 

D. Only the design documents and the functional specifications are known to the test planner. 

Answer:

Q10. Which of the following analyses is performed to protect information assets? 

A. Business impact analysis 

B. Feasibility analysis 

C. Cost benefit analysis 

D. Data analysis 

Answer: