Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CISSP Exam Dumps - ISC 2 Credentials Questions and Answers

Question # 124

What technique used for spoofing the origin of an email can successfully conceal the sender s Internet Protocol (IP) address?

Options:

A.

Change In-Reply-To data

B.

Web crawling

C.

Onion routing

D.

Virtual Private Network (VPN)

Buy Now
Question # 125

The disaster recovery (DR) process should always include

Options:

A.

plan maintenance.

B.

periodic vendor review.

C.

financial data analysis.

D.

periodic inventory review.

Buy Now
Question # 126

A hospital’s building controls system monitors and operates the environmental equipment to maintain a safe and comfortable environment. Which of the following could be used to minimize the risk of utility supply interruption?

Options:

A.

Digital devices that can turn equipment off and continuously cycle rapidly in order to increase supplies and conceal activity on the hospital network

B.

Standardized building controls system software with high connectivity to hospital networks

C.

Lock out maintenance personnel from the building controls system access that can impact critical utility supplies

D.

Digital protection and control devices capable of minimizing the adverse impact to critical utility

Buy Now
Question # 127

A cloud hosting provider would like to provide a Service Organization Control (SOC) report relevant to its security program. This report should an abbreviated report that can be freely distributed. Which type of report BEST meets this requirement?

Options:

A.

SOC 1

B.

SOC 2 Type I

C.

SOC 2 Type II

D.

SOC 3

Buy Now
Question # 128

What are the first two components of logical access control?

Options:

A.

Confidentiality and authentication

B.

Authentication and identification

C.

Identification and confidentiality

D.

Authentication and availability

Buy Now
Question # 129

Which of the following System and Organization Controls (SOC) report types should an organization request if they require a period of time report covering security and availability for a particular system?

Options:

A.

SOC 1 Type1

B.

SOC 1Type2

C.

SOC 2 Type 1

D.

SOC 2 Type 2

Buy Now
Question # 130

Individuals have been identified and determined as having a need-to-know for the information. Which of the following access control methods MUST include a consistent set of rules for controlling and limiting access?

Options:

A.

Attribute Based Access Control (ABAC)

B.

Role-Based Access Control (RBAC)

C.

Discretionary Access Control (DAC)

D.

Mandatory Access Control (MAC)

Buy Now
Question # 131

Which is the second phase of public key Infrastructure (pk1) key/certificate life-cycle management?

Options:

A.

Issued Phase

B.

Cancellation Phase

C.

Implementation phase

D.

Initialization Phase

Buy Now
Question # 132

Two remote offices need to be connected securely over an untrustworthy MAN. Each office needs to access network shares at the other site. Which of the following will BEST provide this functionality?

Options:

A.

Client-to-site VPN

B.

Third-party VPN service

C.

Site-to-site VPN

D.

Split-tunnel VPN

Buy Now
Question # 133

Which of the fallowing statements is MOST accurate regarding information assets?

Options:

A.

International Organization for Standardization (ISO) 27001 compliance specifies which information assets must be included in asset inventory.

B.

S3 Information assets include any information that is valuable to the organization,

C.

Building an information assets register is a resource-intensive job.

D.

Information assets inventory is not required for risk assessment.

Buy Now
Question # 134

The application owner of a system that handles confidential data leaves an organization. It is anticipated that a replacement will be hired in approximately six months. During that time, which of the following should the organization do?

Options:

A.

Gram temporary access to the former application owner's account

B.

Assign a temporary application owner to the system.

C.

Restrict access to the system until a replacement application owner rs hired.

D.

Prevent changes to the confidential data until a replacement application owner is hired.

Buy Now
Question # 135

Why is authentication by ownership stronger than authentication by knowledge?

Options:

A.

It is easier to change.

B.

It can be kept on the user's person.

C.

It is more difficult to duplicate.

D.

It is simpler to control.

Buy Now
Question # 136

Assuming an individual has taken all of the steps to keep their internet connection private, which of the following is the BEST to browse the web privately?

Options:

A.

Prevent information about browsing activities from being stored in the cloud.

B.

Store browsing activities in the cloud.

C.

Prevent information about browsing activities farm being stored on the personal device.

D.

Store information about browsing activities on the personal device.

Buy Now
Question # 137

Which of the following techniques evaluates the secure design principles of network OF software architectures?

Options:

A.

Risk modeling

B.

Threat modeling

C.

Fuzzing

D.

Waterfall method

Buy Now
Question # 138

What type of access control determines the authorization to resource based on pre-defined job titles within an organization?

Options:

A.

Role-Based Access Control (RBAC)

B.

Role-based access control

C.

Non-discretionary access control

D.

Discretionary Access Control (DAC)

Buy Now
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Jan 31, 2025
Questions: 1486
CISSP pdf

CISSP PDF

$119.7  $399
CISSP Engine

CISSP Testing Engine

$134.7  $449
CISSP PDF + Engine

CISSP PDF + Testing Engine

$179.7  $599