Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISSP Exam Dumps - ISC 2 Credentials Questions and Answers

Question # 154

Which of the following secures web transactions at the Transport Layer?

Options:

A.

Secure HyperText Transfer Protocol (S-HTTP)

B.

Secure Sockets Layer (SSL)

C.

Socket Security (SOCKS)

D.

Secure Shell (SSH)

Buy Now
Question # 155

If an identification process using a biometric system detects a 100% match between a presented template and a stored template, what is the interpretation of this result?

Options:

A.

User error

B.

Suspected tampering

C.

Accurate identification

D.

Unsuccessful identification

Buy Now
Question # 156

When planning a penetration test, the tester will be MOST interested in which information?

Options:

A.

Places to install back doors

B.

The main network access points

C.

Job application handouts and tours

D.

Exploits that can attack weaknesses

Buy Now
Question # 157

Which of the following countermeasures is the MOST effective in defending against a social engineering attack?

Options:

A.

Mandating security policy acceptance

B.

Changing individual behavior

C.

Evaluating security awareness training

D.

Filtering malicious e-mail content

Buy Now
Question # 158

Which of the following describes the BEST configuration management practice?

Options:

A.

After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering.

B.

After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering.

C.

The firewall rules are backed up to an air-gapped system.

D.

A baseline configuration is created and maintained for all relevant systems.

Buy Now
Question # 159

What does the Maximum Tolerable Downtime (MTD) determine?

Options:

A.

The estimated period of time a business critical database can remain down before customers are affected.

B.

The fixed length of time a company can endure a disaster without any Disaster Recovery (DR) planning

C.

The estimated period of time a business can remain interrupted beyond which it risks never recovering

D.

The fixed length of time in a DR process before redundant systems are engaged

Buy Now
Question # 160

Drag the following Security Engineering terms on the left to the BEST definition on the right.

Options:

Buy Now
Question # 161

Which of the following entities is ultimately accountable for data remanence vulnerabilities with data replicated by a cloud service provider?

Options:

A.

Data owner

B.

Data steward

C.

Data custodian

D.

Data processor

Buy Now
Question # 162

What is a characteristic of Secure Socket Layer (SSL) and Transport Layer Security (TLS)?

Options:

A.

SSL and TLS provide a generic channel security mechanism on top of Transmission Control Protocol (TCP).

B.

SSL and TLS provide nonrepudiation by default.

C.

SSL and TLS do not provide security for most routed protocols.

D.

SSL and TLS provide header encapsulation over HyperText Transfer Protocol (HTTP).

Buy Now
Question # 163

What is the PRIMARY difference between security policies and security procedures?

Options:

A.

Policies are used to enforce violations, and procedures create penalties

B.

Policies point to guidelines, and procedures are more contractual in nature

C.

Policies are included in awareness training, and procedures give guidance

D.

Policies are generic in nature, and procedures contain operational details

Buy Now
Question # 164

In the Software Development Life Cycle (SDLC), maintaining accurate hardware and software inventories is a critical part of

Options:

A.

systems integration.

B.

risk management.

C.

quality assurance.

D.

change management.

Buy Now
Question # 165

The 802.1x standard provides a framework for what?

Options:

A.

Network authentication for only wireless networks

B.

Network authentication for wired and wireless networks

C.

Wireless encryption using the Advanced Encryption Standard (AES)

D.

Wireless network encryption using Secure Sockets Layer (SSL)

Buy Now
Question # 166

Which of the following analyses is performed to protect information assets?

Options:

A.

Business impact analysis

B.

Feasibility analysis

C.

Cost benefit analysis

D.

Data analysis

Buy Now
Question # 167

Which Web Services Security (WS-Security) specification handles the management of security tokens and the underlying policies for granting access? Click on the correct specification in the image below.

Options:

Buy Now
Question # 168

Which of the following controls is the FIRST step in protecting privacy in an information system?

Options:

A.

Data Redaction

B.

Data Minimization

C.

Data Encryption

D.

Data Storage

Buy Now
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Jan 31, 2025
Questions: 1486
CISSP pdf

CISSP PDF

$119.7  $399
CISSP Engine

CISSP Testing Engine

$134.7  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$179.7  $599