CISSP Practice Test Questions

1487 Questions


Topic 14: NEW Questions C

Which of the following is the BEST definition of Cross-Site Request Forgery (CSRF)?


A.

An attack which forces an end user to execute unwanted actions on a web application in
which they are currently authenticated


B.

An attack that injects a script into a web page to execute a privileged command


C.

An attack that makes an illegal request across security zones and thereby forges itself
into the security database of the system


D.

An attack that forges a false Structure Query Language (SQL) command across systems





A.
  

An attack which forces an end user to execute unwanted actions on a web application in
which they are currently authenticated



As a security manger which of the following is the MOST effective practice for providing value to an organization?


A.

Assess business risk and apply security resources accordingly


B.

Coordinate security implementations with internal audit


C.

Achieve compliance regardless of related technical issues


D.

Identify confidential information and protect it





D.
  

Identify confidential information and protect it



Why are mobile devices sometimes difficult to investigate in a forensic examination?


A.

There are no forensic tools available for examination.


B.

They may have proprietary software installed to protect them.


C.

They have password-based security at logon.


D.

They may contain cryptographic protection.





B.
  

They may have proprietary software installed to protect them.



Which of the following is considered the last line defense in regard to a Governance, Risk
managements, and compliance (GRC) program?


A.

Internal audit


B.

Internal controls


C.

Board review


D.

Risk management





B.
  

Internal controls



What is the best way for mutual authentication of devices belonging to the same
organization?


A.

Token


B.

Certificates


C.

User ID and passwords


D.

Biometric





A.
  

Token



Reference:
https://books.google.com.pk/books?id=bb0re6h8JPAC&pg=PA637&lpg=PA637&dq=CISSP
+for+mutual+authentication+of+devices+belonging+to+the+same+organization&source=bl
&ots=7VyomeF8Fj&sig=ACfU3U3ZoosKA_v0zOaW67NSffzcCR7sA&
hl=en&sa=X&ved=2ahUKEwjq4o2TgKrpAhUQ9IUKHbGlAhwQ6AEwAHoECBEQA
Q#v=onepage&q=CISSP-for-mutual-authentication-of-devices-belon
ging-to-the-same-organization&f=false

Which of the following open source software issues pose the MOST risk to an application?


A.

The software is beyond end of life and the vendor is out of business.


B.

The software is not used or popular in the development community.


C.

The software has multiple Common Vulnerabilities and Exposures (CVE) and only some
are remediated.


D.

The software has multiple Common Vulnerabilities and Exposures (CVE) but the CVEs
are classified as low risks.





D.
  

The software has multiple Common Vulnerabilities and Exposures (CVE) but the CVEs
are classified as low risks.



Which of the following is TRUE regarding equivalence class testing?


A.

It is characterized by the stateless behavior of a process implemented In a function.


B.

An entire partition can be covered by considering only one representative value from
that partition.


C.

Test inputs are obtained from the derived boundaries of the given functional
specifications.


D.

It is useful for testing communications protocols and graphical user interfaces.





C.
  

Test inputs are obtained from the derived boundaries of the given functional
specifications.



Which of the following steps is performed during the forensic data analysis phase?


A.

Collect known system files


B.

search for relevant strings.


C.

Create file lists


D.

Recover deleted data





B.
  

search for relevant strings.



Digital certificates used transport Layer security (TLS) support which of the following?


A.

Server identify and data confidentially


B.

Information input validation


C.

Multi-Factor Authentication (MFA)


D.

Non-reputation controls and data encryption





A.
  

Server identify and data confidentially



Functional security testing is MOST critical during which phese of the system development Life Cycle (SDLC)?


A.

Acquisition / Development


B.

Operations / Maintenance


C.

Implementation


D.

Initiation





C.
  

Implementation



Which of the below strategies would MOST comprehensively address the risk of malicious insiders leaking sensitive information?


A.

Data Los Protection (DIP), firewalls, data classification


B.

Least privilege access, Data Loss Protection (DLP), physical access controls


C.

Staff vetting, least privilege access, Data Loss Protection (DLP)


D.

Background checks, data encryption, web proxies





B.
  

Least privilege access, Data Loss Protection (DLP), physical access controls



Which of the following is applicable to a publicly held company concerned about
information handling and storage requirement specific to the financial reporting?


A.

Privacy Act of 1974


B.

Clinger-Cohan Act of 1996


C.

Sarbanes-Oxley (SOX) Act of 2002


D.

International Organization for Standardization (ISO) 27001





C.
  

Sarbanes-Oxley (SOX) Act of 2002




Page 56 out of 124 Pages
Previous