Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISSP Exam Dumps - ISC 2 Credentials Questions and Answers

Question # 109

What is the term commonly used to refer to a technique of authenticating one machine to another by forging packets from a trusted source?

Options:

A.

Man-in-the-Middle (MITM) attack

B.

Smurfing

C.

Session redirect

D.

Spoofing

Buy Now
Question # 110

Which of the following is the MOST important consideration when storing and processing Personally Identifiable Information (PII)?

Options:

A.

Encrypt and hash all PII to avoid disclosure and tampering.

B.

Store PII for no more than one year.

C.

Avoid storing PII in a Cloud Service Provider.

D.

Adherence to collection limitation laws and regulations.

Buy Now
Question # 111

When building a data center, site location and construction factors that increase the level of vulnerability to physical threats include

Options:

A.

hardened building construction with consideration of seismic factors.

B.

adequate distance from and lack of access to adjacent buildings.

C.

curved roads approaching the data center.

D.

proximity to high crime areas of the city.

Buy Now
Question # 112

Which of the following is the MAIN reason that system re-certification and re-accreditation are needed?

Options:

A.

To assist data owners in making future sensitivity and criticality determinations

B.

To assure the software development team that all security issues have been addressed

C.

To verify that security protection remains acceptable to the organizational security policy

D.

To help the security team accept or reject new systems for implementation and production

Buy Now
Question # 113

Which of the following is a method used to prevent Structured Query Language (SQL) injection attacks?

Options:

A.

Data compression

B.

Data classification

C.

Data warehousing

D.

Data validation

Buy Now
Question # 114

Which of the following does the Encapsulating Security Payload (ESP) provide?

Options:

A.

Authorization and integrity

B.

Availability and integrity

C.

Integrity and confidentiality

D.

Authorization and confidentiality

Buy Now
Question # 115

When implementing controls in a heterogeneous end-point network for an organization, it is critical that

Options:

A.

hosts are able to establish network communications.

B.

users can make modifications to their security software configurations.

C.

common software security components be implemented across all hosts.

D.

firewalls running on each host are fully customizable by the user.

Buy Now
Question # 116

Why is a system's criticality classification important in large organizations?

Options:

A.

It provides for proper prioritization and scheduling of security and maintenance tasks.

B.

It reduces critical system support workload and reduces the time required to apply patches.

C.

It allows for clear systems status communications to executive management.

D.

It provides for easier determination of ownership, reducing confusion as to the status of the asset.

Buy Now
Question # 117

Which of the following is an essential element of a privileged identity lifecycle management?

Options:

A.

Regularly perform account re-validation and approval

B.

Account provisioning based on multi-factor authentication

C.

Frequently review performed activities and request justification

D.

Account information to be provided by supervisor or line manager

Buy Now
Question # 118

A security consultant has been asked to research an organization's legal obligations to protect privacy-related information. What kind of reading material is MOST relevant to this project?

Options:

A.

The organization's current security policies concerning privacy issues

B.

Privacy-related regulations enforced by governing bodies applicable to the organization

C.

Privacy best practices published by recognized security standards organizations

D.

Organizational procedures designed to protect privacy information

Buy Now
Question # 119

An organization wants to define its physical perimeter. What primary device should be used to accomplish this objective if the organization's perimeter MUST cost-efficiently deter casual trespassers?

Options:

A.

Fences eight or more feet high with three strands of barbed wire

B.

Fences three to four feet high with a turnstile

C.

Fences accompanied by patrolling security guards

D.

Fences six to seven feet high with a painted gate

Buy Now
Question # 120

What is the BEST approach to anonymizing personally identifiable information (PII) in a test environment?

Options:

A.

Randomizing data

B.

Swapping data

C.

Encrypting data

D.

Encoding data

Buy Now
Question # 121

Which of the following should exist in order to perform a security audit?

Options:

A.

Industry framework to audit against

B.

External (third-party) auditor

C.

Internal certified auditor

D.

Neutrality of the auditor

Buy Now
Question # 122

Which of the following is the MOST important rule for digital investigations?

Options:

A.

Ensure event logs are rotated.

B.

Ensure original data is never modified.

C.

Ensure individual privacy is protected.

D.

Ensure systems are powered on.

Buy Now
Question # 123

What Hypertext Transfer Protocol (HTTP) response header can be used to disable the execution of inline JavaScript and the execution of eval()-type functions?

Options:

A.

Strict-Transport-Security

B.

X-XSS-Protection

C.

X-Frame-Options

D.

Content-Security-Policy

Buy Now
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Jan 31, 2025
Questions: 1486
CISSP pdf

CISSP PDF

$119.7  $399
CISSP Engine

CISSP Testing Engine

$134.7  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$179.7  $599