CISSP Practice Test Questions

1487 Questions


Topic 13: New Questions B

Which of the following is MOST effective in detecting information hiding in Transmission
Control Protocol/internet Protocol (TCP/IP) traffic?


A.

Stateful inspection firewall


B.

Application-level firewall


C.

Content-filtering proxy


D.

Packet-filter firewall





A.
  

Stateful inspection firewall



Which Identity and Access Management (IAM) process can be used to maintain the principle of least
privilege?


A.

provisionin


B.

access recovery


C.

multi-factor authentication (MFA)


D.

user access review





A.
  

provisionin



What is the expected outcome of security awareness in support of a security awareness
program?


A.

Awareness activities should be used to focus on security concerns and respond to those concerns accordingly


B.

Awareness is not an activity or part of the training but rather a state of persistence to support the program


C.

Awareness is training. The purpose of awareness presentations is to broaden attention of security.


D.

Awareness is not training. The purpose of awareness presentation is simply to focus attention on security.





C.
  

Awareness is training. The purpose of awareness presentations is to broaden attention of security.



As part of the security assessment plan, the security professional has been asked to use a
negative testing strategy on a new website. Which of the following actions would beperformed?


A.

Use a web scanner to scan for vulnerabilities within the website.


B.

Perform a code review to ensure that the database references are properly addressed.


C.

Establish a secure connection to the web server to validate that only the approved ports
are open.


D.

Enter only numbers in the web form and verify that the website prompts the user to enter a valid input.





D.
  

Enter only numbers in the web form and verify that the website prompts the user to enter a valid input.



Which security access policy contains fixed security attributes that are used by the system to determine a user’s access to a file or object?


A.

Mandatory Access Control (MAC)


B.

Access Control List (ACL)


C.

Discretionary Access Control (DAC)


D.

Authorized user control





A.
  

Mandatory Access Control (MAC)



Which of the following is a responsibility of the information owner?


A.

Ensure that users and personnel complete the required security training to access the Information System
(IS)


B.

Defining proper access to the Information System (IS), including privileges or access rights


C.

Managing identification, implementation, and assessment of common security controls


D.

Ensuring the Information System (IS) is operated according to agreed upon security requirements





C.
  

Managing identification, implementation, and assessment of common security controls



A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?


A.

25%


B.

50%


C.

75%


D.

100%





B.
  

50%



An organization adopts a new firewall hardening standard. How can the security
professional verify that the technical staff correct implemented the new standard?


A.

Perform a compliance review


B.

Perform a penetration test


C.

Train the technical staff


D.

Survey the technical staff





A.
  

Perform a compliance review



Digital certificates used in Transport Layer Security (TLS) support which of the following?


A.

Information input validation


B.

Non-repudiation controls and data encryption


C.

Multi-Factor Authentication (MFA)


D.

Server identity and data confidentially





D.
  

Server identity and data confidentially



Which of the following are important criteria when designing procedures and acceptance criteria for acquired software?


A.

Code quality, security, and origin


B.

Architecture, hardware, and firmware


C.

Data quality, provenance, and scaling


D.

Distributed, agile, and bench testing





A.
  

Code quality, security, and origin



What is the MAIN goal of information security awareness and training?


A.

To inform users of the latest malware threats


B.

To inform users of information assurance responsibilities


C.

To comply with the organization information security policy


D.

To prepare students for certification





B.
  

To inform users of information assurance responsibilities



What is the PRIMARY role of a scrum master in agile development?


A.

To choose the primary development language


B.

To choose the integrated development environment


C.

To match the software requirements to the delivery plan


D.

To project manage the software delivery





D.
  

To project manage the software delivery




Page 52 out of 124 Pages
Previous