Vcehome > home > Popular Exams > CISSP > CISSP Online Practice Questions and Answers

CISSP Online Practice Questions and Answers

Questions 4

Who has the PRIMARY responsibility to ensure that security objectives are aligned with organization goals?

A. Senior management

B. Information security department

C. Audit committee

D. All users

Browse 1703 Q&As
Questions 5

During an audit, the auditor finds evidence of potentially illegal activity. Which of the following is the MOST appropriate action to take?

A. Immediately call the police

B. Work with the client to resolve the issue internally

C. Advise the person performing the illegal activity to cease and desist

D. Work with the client to report the activity to the appropriate authority

Browse 1703 Q&As
Questions 6

Physical assets defined in an organization's Business Impact Analysis (BIA) could include which of the following?

A. Personal belongings of organizational staff members

B. Supplies kept off-site at a remote facility

C. Cloud-based applications

D. Disaster Recovery (DR) line-item revenues

Browse 1703 Q&As
Questions 7

Why might a network administrator choose distributed virtual switches instead of stand-alone switches for network segmentation?

A. To standardize on a single vendor

B. To ensure isolation of management traffic

C. To maximize data plane efficiency

D. To reduce the risk of configuration errors

Browse 1703 Q&As
Questions 8

A group of organizations follows the same access standards and practices. One manages the verification and due diligence processes for the others. For a user to access a resource from one of the organizations, a check is made to see if that user has been certified. Which Federated Identity Management (FIM) process is this an example of?

A. One-time authentication

B. Web based access management

C. Cross-certification model

D. Bridge model

Browse 1703 Q&As
Questions 9

Which of the following is the MOST relevant risk indicator after a penetration test?

A. Lists of hosts vulnerable to remote exploitation attacks

B. Details of vulnerabilities and recommended remediation

C. Lists of target systems on the network identified and scanned for vulnerabilities

D. Details of successful vulnerability exploitations

Browse 1703 Q&As
Questions 10

Which of the following is the MOST important rule for digital investigations?

A. Ensure event logs are rotated.

B. Ensure original data is never modified.

C. Ensure individual privacy is protected.

D. Ensure systems are powered on.

Browse 1703 Q&As
Questions 11

A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information:

Which of the following is MOST likely the cause of the issue?

A. Channel overlap

B. Poor signal

C. Incorrect power settings

D. Wrong antenna type

Browse 1703 Q&As
Questions 12

Which is the BEST control to meet the Statement on Standards for Attestation Engagements 18 (SSAE-18) confidentiality category?

A. Data processing

B. Storage encryption

C. File hashing

D. Data retention policy

Browse 1703 Q&As
Questions 13

When performing an investigation with the potential for legal action, what should be the analyst's FIRST consideration?

A. Chain-of-custody

B. Authorization to collect

C. Court admissibility

D. Data decryption

Browse 1703 Q&As
Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional
Last Update: May 07, 2024
Questions: 1703 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99