Cissp: Question & Answers
Cissp: Question & Answers
m
CISSP o
.c
Certified Information Systems Security Professional
te
Correct Answer: C
QUESTION 2
What is the MAIN objective of risk analysis in Disaster Recovery (DR) planning?
A. Establish Maximum Tolerable Downtime (MTD) Information Systems (IS).
m
B. Define the variable cost for extended downtime scenarios.
C. Identify potential threats to business availability.
D. o
Establish personnel requirements for various downtime scenarios.
.c
te
ga
Correct Answer: C
ps
um
QUESTION 3
Which of the following is an important requirement when designing a secure remote access system?
D
A. Configure a Demilitarized Zone (DMZ) to ensure that user and service traffic is separated.
B. Provide privileged access rights to computer files and systems.
C. Ensure that logging and audit controls are included.
D. Reduce administrative overhead through password self service.
Correct Answer: C
QUESTION 4
An audit of an application reveals that the current configuration does not match the configuration of
the originally implemented application. Which of the following is the FIRST action to be taken?
A. Recommend an update to the change control process.
B. Verify the approval of the configuration change.
C. Roll back the application to the original configuration.
D. Document the changes to the configuration.
Correct Answer: B
QUESTION 5
For a federated identity solution, a third-party Identity Provider (IdP) is PRIMARILY responsible for
which of the following?
A. Access Control
B. Account Management
C. Authentication
D. Authorization
m
Correct Answer: C
o
.c
te
QUESTION 6
ga
What should be the FIRST action for a security administrator who detects an intrusion on the network
ps
Correct Answer: C
QUESTION 7
Asymmetric algorithms are used for which of the following when using Secure Sockets
Layer/Transport Layer Security (SSL/TLS) for implementing network security?
A. Peer authentication
B. Payload data encryption
C. Session encryption
D. Hashing digest
Correct Answer: C
QUESTION 8
Which of the following can be used to calculate the loss event probability?
A. Total number of possible outcomes divided by frequency of outcomes
B. Number of outcomes divided by total number of possible outcomes
C. Number of outcomes multiplied by total number of possible outcomes
D. Total number of possible outcomes multiplied by frequency of outcomes
Correct Answer: B
m
QUESTION 9
o
Which of the following System and Organization Controls (SOC) report types should an organization
.c
request if they require a period of time report covering security and availability for a particular
te
system?
A. SOC 1 Type1
ga
B. SOC 1Type2
C. SOC 2 Type 1
ps
D. SOC 2 Type 2
um
Correct Answer: D
D
QUESTION 10
If virus infection is suspected, which of the following is the FIRST step for the user to take?
A. Unplug the computer from the network.
B. Save the opened files and shutdown the computer.
C. Report the incident to service desk.
D. Update the antivirus to the latest version.
Correct Answer: C
QUESTION 11
Which of the following security testing strategies is BEST suited for companies with low to moderate
security maturity?
A. Load Testing
B. White-box testing
C. Black -box testing
D. Performance testing
Correct Answer: B
QUESTION 12
What is the BEST location in a network to place Virtual Private Network (VPN) devices when an
m
internal review reveals network design flaws in remote access?
A. In a dedicated Demilitarized Zone (DMZ)
B. o
In its own separate Virtual Local Area Network (VLAN)
.c
C. At the Internet Service Provider (ISP)
te
D. Outside the external firewall
ga
ps
Correct Answer: B
um
QUESTION 13
D
Which of the following MUST be scalable to address security concerns raised by the integration of
third-party
identity services?
A. Mandatory Access Controls (MAC)
B. Enterprise security architecture
C. Enterprise security procedures
D. Role Based Access Controls (RBAC)
Correct Answer: C
QUESTION 14
Correct Answer: C
Explanation/Reference:
QUESTION 15
m
When using Generic Routing Encapsulation (GRE) tunneling over Internet Protocol version 4 (IPv4),
where is the GRE header inserted?
o
.c
A. Into the options field
te
B. Between the delivery header and payload
C. Between the source and destination addresses
ga
Correct Answer: B
D
QUESTION 16
Correct Answer: A
QUESTION 17
Internet protocol security (IPSec), point-to-point tunneling protocol (PPTP), and secure sockets Layer
(SSL) all use Which of the following to prevent replay attacks?
A. Large Key encryption
B. Single integrity protection
C. Embedded sequence numbers
D. Randomly generated nonces
Correct Answer: C
QUESTION 18
When conducting a security assessment of access controls, which activity is part of the data analysis
phase?
m
A. Present solutions to address audit exceptions.
B. Conduct statistical sampling of data transactions.
o
.c
C. Categorize and identify evidence gathered during the audit.
D. Collect logs and reports.
te
ga
Correct Answer: C
ps
um
Explanation/Reference:
D
QUESTION 19
Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet
Protocol Security (IPSec) connection?
A. Temporal Key Integrity Protocol (TKIP)
B. Secure Hash Algorithm (SHA)
C. Secure Shell (SSH)
D. Transport Layer Security (TLS)
Correct Answer: B
QUESTION 20
A manufacturing organization wants to establish a Federated Identity Management (FIM) system with
its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing
organization?
A. Trusted third-party certification
B. Lightweight Directory Access Protocol (LDAP)
C. Security Assertion Markup language (SAML)
D. Cross-certification
Correct Answer: C
QUESTION 21
m
Why must all users be positively identified prior to using multi-user computers?
A. To provide access to system privileges
B. To provide access to the operating system o
.c
C. To ensure that unauthorized persons cannot access the computers
te
D. To ensure that management knows what users are currently logged on
ga
ps
Correct Answer: C
um
QUESTION 22
D
Which of the following is the MOST important output from a mobile application threat modeling
exercise according to Open Web Application Security Project (OWASP)?
A. Application interface entry and endpoints
B. The likelihood and impact of a vulnerability
C. Countermeasures and mitigations for vulnerabilities
D. A data flow diagram for the application and attack surface analysis
Correct Answer: D
QUESTION 23
Correct Answer: C
Explanation/Reference:
QUESTION 24
An analysis finds unusual activity coming from a computer that was thrown away several months
m
prior, which of the following steps ensure the proper removal of the system?
A. Deactivation
o
.c
B. Decommission
C. Deploy
te
D. Procure
ga
ps
Correct Answer: B
um
D
QUESTION 25
Correct Answer: B
QUESTION 26
What is the term commonly used to refer to a technique of authenticating one machine to another by
forging packets from a trusted source?
A. Man-in-the-Middle (MITM) attack
B. Smurfing
C. Session redirect
D. Spoofing
Correct Answer: D
QUESTION 27
Correct Answer: C o m
.c
te
ga
QUESTION 28
ps
Correct Answer: A
QUESTION 29
QUESTION 30
Intellectual property rights are PRIMARY concerned with which of the following?
A. Owner's ability to realize financial gain
B. Owner's ability to maintain copyright
C. Right of the owner to enjoy their creation
D. Right of the owner to control delivery method
Correct Answer: D
m
Explanation/Reference:
computer.
D. The residual information left on magnetic storage media after a deletion or erasure.
D
Correct Answer: D
QUESTION 32
An organization is found lacking the ability to properly establish performance indicators for its Web
hosting solution during an audit. What would be the MOST probable cause?
A. Absence of a Business Intelligence (BI) solution
B. Inadequate cost modeling
C. Improper deployment of the Service-Oriented Architecture (SOA)
D. Insufficient Service Level Agreement (SLA)
Correct Answer: D
QUESTION 33
When adopting software as a service (Saas), which security responsibility will remain with remain with
the adopting organization?
A. Physical security
B. Data classification
C. Network control
D. Application layer control
Correct Answer: B
m
QUESTION 34
o
.c
Which of the following standards/guidelines requires an Information Security Management System
te
(ISMS) to be defined?
A. International Organization for Standardization (ISO) 27000 family
ga
D. ISO/IEC 20000
um
Correct Answer: A
D
QUESTION 35
Which of the following are important criteria when designing procedures and acceptance criteria for
acquired software?
A. Code quality, security, and origin
B. Architecture, hardware, and firmware
C. Data quality, provenance, and scaling
D. Distributed, agile, and bench testing
Correct Answer: A
QUESTION 36
What type of encryption is used to protect sensitive data in transit over a network?
A. Payload encryption and transport encryption
B. Authentication Headers (AH)
C. Keyed-Hashing for Message Authentication
D. Point-to-Point Encryption (P2PE)
Correct Answer: A
QUESTION 37
Which of the following is a characteristic of the initialization vector when using Data Encryption
Standard (DES)?
m
A. It must be known to both sender and receiver.
B. It can be transmitted in the clear as a random number.
C. o
It must be retained until the last block is transmitted.
.c
D. It can be used to encrypt and decrypt information.
te
ga
Correct Answer: B
ps
um
QUESTION 38
D
A security compliance manager of a large enterprise wants to reduce the time it takes to perform
network,
system, and application security compliance audits while increasing quality and effectiveness of the
results.
What should be implemented to BEST achieve the desired results?
A. Configuration Management Database (CMDB)
B. Source code repository
C. Configuration Management Plan (CMP)
D. System performance monitoring application
Correct Answer: A
QUESTION 39
Correct Answer: A
QUESTION 40
What MUST each information owner do when a system contains data from multiple information
owners?
m
A. Provide input to the Information System (IS) owner regarding the security requirements of the
data
o
B. Review the Security Assessment report (SAR) for the Information System (IS) and authorize the IS
.c
tooperate.
te
C. Develop and maintain the System Security Plan (SSP) for the Information System (IS) containing
the data
ga
D. Move the data to an Information System (IS) that does not contain data owned by other
informationowners
ps
um
Correct Answer: C
D
Explanation/Reference:
QUESTION 41
Which of the following is a strategy of grouping requirements in developing a Security Test and
Evaluation (ST&E)?
A. Standards, policies, and procedures
B. Tactical, strategic, and financial
C. Management, operational, and technical
D. Documentation, observation, and manual
Correct Answer: C
QUESTION 42
Which of the following is BEST achieved through the use of eXtensible Access Markup Language
(XACML)?
A. Minimize malicious attacks from third parties
B. Manage resource privileges
C. Share digital identities in hybrid cloud
D. Defined a standard protocol
Correct Answer: B
m
QUESTION 43
o
.c
Which of the following is a MAJOR consideration in implementing a Voice over IP (VoIP) network?
te
A. Use of a unified messaging.
B. Use of separation for the voice network.
ga
Correct Answer: B
D
QUESTION 44
Which of the following factors is PRIMARY reason to drive changes in an Information Security
Continuous Monitoring (ISCM) strategy?
A. Testing and Evaluation (TE) personnel changes
B. Changes to core missions or business processes
C. Increased Cross-Site Request Forgery (CSRF) attacks
D. Changes in Service Organization Control (SOC) 2 reporting requirements
Correct Answer: B
QUESTION 45
Correct Answer: B
m
QUESTION 46
o
.c
A company whose Information Technology (IT) services are being delivered from a Tier 4 data center,
is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should
te
the IT manager be concerned with?
ga
A. Application
B. Storage
ps
C. Power
D. Network
um
D
Correct Answer: C
QUESTION 47
Correct Answer: A
QUESTION 48
Correct Answer: D
m
QUESTION 49
o
.c
A security professional should consider the protection of which of the following elements FIRST when
developing a defense-in-depth strategy for a mobile workforce?
te
A. Network perimeters
ga
D. End-user devices
um
Correct Answer: D
D
QUESTION 50
Who is essential for developing effective test scenarios for disaster recovery (DR) test plans?
A. Business line management and IT staff members
B. Chief Information Officer (CIO) and DR manager
C. DR manager end IT staff members
D. IT staff members and project managers
Correct Answer: B
QUESTION 51
Correct Answer: C
QUESTION 52
m
product that meets specific consumer needs.
B. A document that is used to develop an IT security product from its security requirements
definition. o
.c
C. A document that expresses an implementation dependent set of security requirements which
te
contains only the security functional requirements.
D. A document that represents evaluated products where there is a one-to-one correspondence
ga
Correct Answer: A
um
D
QUESTION 53
Which of the following practices provides the development team with a definition of
security and identification of threats in designing software?
A. Penetration testing
B. Stakeholder review
C. Threat modeling
D. Requirements review
Correct Answer: C
QUESTION 54
Which of the following will have the MOST influence on the definition and creation of data
classification and data ownership policies?
A. Data access control policies
B. Threat modeling
C. Common Criteria (CC)
D. Business Impact Analysis (BIA)
Correct Answer: A
QUESTION 55
Which of the following protocols would allow an organization to maintain a centralized list of users
m
that can read a protected webpage?
A. Lightweight Directory Access Control (LDAP)
B. Security Assertion Markup Language (SAML) o
.c
C. Hypertext Transfer Protocol (HTTP)
te
D. Kerberos
ga
ps
Correct Answer: A
um
QUESTION 56
D
What is the BEST approach for maintaining ethics when a security professional is
unfamiliar with the culture of a country and is asked to perform a questionable task?
A. Exercise due diligence when deciding to circumvent host government requests.
B. Become familiar with the means in which the code of ethics is applied and considered.
C. Complete the assignment based on the customer's wishes.
D. Execute according to the professional's comfort level with the code of ethics.
Correct Answer: B
QUESTION 57
Correct Answer: A
QUESTION 58
o m
.c
Correct Answer: B
te
ga
QUESTION 59
ps
A security professional determines that a number of outsourcing contracts inherited from a previous
um
merger do not adhere to the current security requirements. Which of the following BEST minimizes
the risk of this
happening again?
D
Correct Answer: D
QUESTION 60
Rank the Hypertext Transfer protocol (HTTP) authentication types shows below in order of relative
strength.
Drag the authentication type on the correct positions on the right according to strength from weakest
to strongest.
Correct Answer:
m
QUESTION 61
o
Which of the following objects should be removed FIRST prior to uploading code to public code
.c
repositories?
te
A. Security credentials
B. Known vulnerabilities
ga
C. Inefficient algorithms
D. Coding mistakes
ps
um
Correct Answer: A
D
QUESTION 62
Correct Answer: A
QUESTION 63
Which of the following is a process in the access provisioning lifecycle that will MOST likely identify
access aggregation issues?
A. Test
B. Assessment
C. Review
D. Peer review
Correct Answer: C
QUESTION 64
How can a forensic specialist exclude from examination a large percentage of operating system files
m
residing on a copy of the target system?
A. Take another backup of the media in question then delete all irrelevant operating system files.
o
B. Create a comparison database of cryptographic hashes of the files from a system with the same
.c
operating system and patch level.
te
C. Generate a message digest (MD) or secure hash on the drive image to detect tampering of the
media being examined.
ga
D. Discard harmless files for the operating system, and known installed programs.
ps
Correct Answer: B
um
D
QUESTION 65
What is the PRIMARY difference between security policies and security procedures?
A. Policies are used to enforce violations, and procedures create penalties
B. Policies point to guidelines, and procedures are more contractual in nature
C. Policies are included in awareness training, and procedures give guidance
D. Policies are generic in nature, and procedures contain operational details
Correct Answer: D
QUESTION 66
Which of the following is a benefit in implementing an enterprise Identity and Access Management
(IAM) solution?
A. Password requirements are simplified.
B. Risk associated with orphan accounts is reduced.
C. Segregation of duties is automatically enforced.
D. Data confidentiality is increased.
Correct Answer: A
QUESTION 67
As part of the security assessment plan, the security professional has been asked to use a negative
testing strategy on a new website. Which of the following actions would be performed?
A. Use a web scanner to scan for vulnerabilities within the website.
B. Perform a code review to ensure that the database references are properly addressed.
m
C. Establish a secure connection to the web server to validate that only the approved ports are open.
D. Enter only numbers in the web form and verify that the website prompts the user to enter a valid
input.
o
.c
te
Correct Answer: D
ga
ps
QUESTION 68
um
What is the process of removing sensitive data from a system or storage device with the intent that
D
Correct Answer: A
QUESTION 69
Which inherent password weakness does a One Time Password (OTP) generator overcome?
A. Static passwords must be changed frequently.
B. Static passwords are too predictable.
C. Static passwords are difficult to generate.
D. Static passwords are easily disclosed.
Correct Answer: D
QUESTION 70
Which of the following is the MOST effective method of mitigating data theft from an active user
workstation?
A. Implement full-disk encryption
B. Enable multifactor authentication
C. Deploy file integrity checkers
D. Disable use of portable devices
m
Correct Answer: D
o
.c
te
QUESTION 71
ga
Which of the following is a security feature of Global Systems for Mobile Communications (GSM)?
A. It uses a Subscriber Identity Module (SIM) for authentication.
ps
Correct Answer: A
QUESTION 72
Which of the following is the MOST important consideration that must be taken into account when
deploying an enterprise patching solution that includes mobile devices?
A. Service provider(s) utilized by the organization
B. Whether it will impact personal use
C. Number of mobile users in the organization
D. Feasibility of downloads due to available bandwidth
Correct Answer: C
QUESTION 73
Correct Answer: B
m
QUESTION 74
o
What does the result of Cost-Benefit Analysis (C8A) on new security initiatives provide?
.c
A. Quantifiable justification
te
B. Baseline improvement
C. Risk evaluation
ga
D. Formalized acceptance
ps
um
Correct Answer: A
D
QUESTION 75
Which of the following MUST be part of a contract to support electronic discovery of data stored in a
cloud environment?
A. Integration with organizational directory services for authentication
B. Tokenization of data
C. Accommodation of hybrid deployment models
D. Identification of data location
Correct Answer: D
QUESTION 76
Which of the following methods MOST efficiently manages user accounts when using a third-party
cloud-based application and directory solution?
A. Cloud directory
B. Directory synchronization
C. Assurance framework
D. Lightweight Directory Access Protocol (LDAP)
Correct Answer: B
QUESTION 77
Alternate encoding such as hexadecimal representations is MOST often observed in which of the
m
following forms of attack?
A. Smurf
B. Rootkit exploit o
.c
C. Denial of Service (DoS)
te
D. Cross site scripting (XSS)
ga
ps
Correct Answer: D
um
QUESTION 78
D
Correct Answer: D
QUESTION 79
When conducting a forensic criminal investigation on a computer had drive, what should be dene
PRIOR to analysis?
A. Create a backup copy of all the important files on the drive.
B. Power off the computer and wait for assistance.
C. Create a forensic image of the hard drive.
D. Install forensic analysis software.
Correct Answer: C
QUESTION 80
Correct Answer: D o m
.c
te
ga
ps
um
D