Pass4itsure > ISC > ISC Certification > CISSP > CISSP Online Practice Questions and Answers

CISSP Online Practice Questions and Answers

Questions 4

Functional security testing is MOST critical during which phese of the system development Life Cycle (SDLC)?

A. Acquisition / Development

B. Operations / Maintenance

C. Implementation

D. Initiation

Buy Now
Questions 5

Which of the following in the BEST way to reduce the impect of an externlly sourced flood attack?

A. Stock the source address at the firewall.

B. Have this service provide block the source address.

C. Block all inbound traffic until the flood ends.

D. Have the source service provider block the address

Buy Now
Questions 6

Which of the following authorization standards is built to handle application programming interface (API) access for Federated identity management (FIM)?

A. Terminal Access Controller Access Control System Plus (TACACS+)

B. Open Authentication (OAuth)

C. Remote Authentication Dial-In User Service (RADIUS)

D. Security Assertion Markup Language (SAM)

Buy Now
Questions 7

For network based evidence, which of the following contains traffic details of all network sessions in order to detect anomalies?

A. Alert data

B. User data

C. Content data

D. Statistical data

Buy Now
Questions 8

What are the steps of a risk assessment?

A. identification, analysis, evaluation

B. analysis, evaluation, mitigation

C. classification, identification, risk management

D. identification, evaluation, mitigation

Buy Now
Questions 9

Which of the following is a detective access control mechanism?

A. Log review

B. Least privilege

C. Password complexity

D. Non-disclosure agreement

Buy Now
Questions 10

Host-Based Intrusion Protection (HIPS) systems are often deployed in monitoring or learning mode during their initial implementation. What is the objective of starting in this mode?

A. Automatically create exceptions for specific actions or files

B. Determine which files are unsafe to access and blacklist them

C. Automatically whitelist actions or files known to the system

D. Build a baseline of normal or safe system events for review

Buy Now
Questions 11

What technique BEST describes antivirus software that detects viruses by watching anomalous behavior?

A. Signature

B. Inference

C. Induction

D. Heuristic

Buy Now
Questions 12

A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system. What PRIMARY action should be taken to improve SIEM performance?

A. Implement role-based system monitoring

B. Audit firewall logs to identify the source of login attempts

C. Enhance logging detail

D. Confirm alarm thresholds

Buy Now
Questions 13

Which of the following is the MOST secure protocol for zremote command access to the firewall?

A. Secure Shell (SSH)

B. Trivial File Transfer Protocol (TFTP)

C. Hypertext Transfer Protocol Secure (HTTPS)

D. Simple Network Management Protocol (SNMP) v1

Buy Now
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional
Last Update: Dec 17, 2024
Questions: 1703
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99