CISSP Practice Test Questions

1487 Questions


Topic 13: New Questions B

What is the MOST significant benefit of an application upgrade that replaces randomly
generated session keys with certificate based encryption for communications with backend
servers?


A.

Non-repudiation


B.

Efficiency


C.

Confidentially


D.

Privacy





A.
  

Non-repudiation



Attack trees are MOST useful for which of the following?


A.

Determining system security scopes


B.

Generating attack libraries


C.

Enumerating threats


D.

Evaluating Denial of Service (DoS) attacks





C.
  

Enumerating threats



When determining who can accept the risk associated with a vulnerability, which of the following is MOST important?


A.

Countermeasure effectiveness


B.

Type of potential loss


C.

Incident likelihood


D.

Information ownership





C.
  

Incident likelihood



What capability would typically be included in a commercially available software package designed for access control?


A.

Password encryption


B.

File encryption


C.

Source library control


D.

File authentication





A.
  

Password encryption



Which type of test would an organization perform in order to locate and target exploitable defects?


A.

Penetration


B.

System


C.

Performance


D.

Vulnerability





A.
  

Penetration



What is the foundation of cryptographic functions?


A.

Encryption


B.

Cipher


C.

Hash


D.

Entropy





D.
  

Entropy



What can happen when an Intrusion Detection System (IDS) is installed inside a firewallprotected internal network?


A.

The IDS can detect failed administrator logon attempts from servers.


B.

The IDS can increase the number of packets to analyze.


C.

The firewall can increase the number of packets to analyze.


D.

The firewall can detect failed administrator login attempts from servers





A.
  

The IDS can detect failed administrator logon attempts from servers.



Assessing a third party’s risk by counting bugs in the code may not be the best measure of
an attack surface
within the supply chain.
Which of the following is LEAST associated with the attack surface?


A.

Input protocols


B.

Target processes


C.

Error messages


D.

Access rights





C.
  

Error messages



Which of the following combinations would MOST negatively affect availability?


A.

Denial of Service (DoS) attacks and outdated hardware


B.

Unauthorized transactions and outdated hardware


C.

Fire and accidental changes to data


D.

Unauthorized transactions and denial of service attacks





A.
  

Denial of Service (DoS) attacks and outdated hardware



What does a Synchronous (SYN) flood attack do?


A.

Forces Transmission Control Protocol /Internet Protocol (TCP/IP) connections into a reset state


B.

Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections


C.

Empties the queue of pending Transmission Control Protocol /Internet Protocol (TCP/IP) requests


D.

Exceeds the limits for new Transmission Control Protocol /Internet Protocol (TCP/IP)
connections





B.
  

Establishes many new Transmission Control Protocol / Internet Protocol (TCP/IP) connections



What MUST each information owner do when a system contains data from multiple information owners?


A.

Provide input to the Information System (IS) owner regarding the security requirements of the data


B.

Review the Security Assessment report (SAR) for the Information System (IS) and authorize the IS to operate.


C.

Develop and maintain the System Security Plan (SSP) for the Information System (IS) containing the data


D.

Move the data to an Information System (IS) that does not contain data owned by other information owners





C.
  

Develop and maintain the System Security Plan (SSP) for the Information System (IS) containing the data



Which of the following could be considered the MOST significant security challenge when
adopting DevOps practices compared to a more traditional control framework?


A.

Achieving Service Level Agreements (SLA) on how quickly patches will be released when a security flaw is found.


B.

Maintaining segregation of duties.


C.

Standardized configurations for logging, alerting, and security metrics.


D.

Availability of security teams at the end of design process to perform last-minute manual audits and reviews.





B.
  

Maintaining segregation of duties.




Page 51 out of 124 Pages
Previous