ISC CISSP Exam Practice Questions (P. 1)
- Full Access (484 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Physical assets defined in an organization's business impact analysis (BIA) could include which of the following?
- APersonal belongings of organizational staff members
- BDisaster recovery (DR) line-item revenues
- CCloud-based applications
- DSupplies kept off-site a remote facilityMost Voted
Correct Answer:
D
D

Supplies stored off-site at a remote facility are indeed considered physical assets within the framework of a Business Impact Analysis (BIA). These assets are typically strategic reserves intended for use in disaster recovery (DR) or to maintain business continuity following an operational disruption. Thus, including them in a BIA helps ensure that all critical assets are accounted for and properly managed in the overall contingency planning.
send
light_mode
delete
Question #2
When assessing the audit capability of an application, which of the following activities is MOST important?
- AIdentify procedures to investigate suspicious activity.
- BDetermine if audit records contain sufficient information.Most Voted
- CVerify if sufficient storage is allocated for audit records.
- DReview security plan for actions to be taken in the event of audit failure.
Correct Answer:
C
C

When evaluating an application’s audit capability, it's crucial to ensure there's enough storage space designated for audit records. This is primarily because, without sufficient storage, even the most comprehensive audit records won't be helpful if they can't be stored and accessed when needed. This focus on availability supports the application's ability to consistently provide reliable audit data over time. Considerations of record sufficiency and investigation processes, although important, are secondary if the fundamental data cannot be preserved due to a lack of storage.
send
light_mode
delete
Question #3
An organization would like to implement an authorization mechanism that would simplify the assignment of various system access permissions for many users with similar job responsibilities. Which type of authorization mechanism would be the BEST choice for the organization to implement?
- ARole-based access control (RBAC)Most Voted
- BDiscretionary access control (DAC)
- CContent-dependent Access Control
- DRule-based Access Control
Correct Answer:
A
A

Role-based Access Control (RBAC) is the ideal choice for an organization looking to streamline the process of assigning access permissions based on job responsibilities. RBAC groups permissions into roles, which can then be assigned to users, making it simpler and more efficient to manage permissions for groups of users with similar roles, especially in dynamic organizational environments. This ensures both operational efficiency and compliance with security policies.
send
light_mode
delete
Question #4
What is the PRIMARY reason for criminal law being difficult to enforce when dealing with cybercrime?
- AJurisdiction is hard to define.Most Voted
- BLaw enforcement agencies are understaffed.
- CExtradition treaties are rarely enforced.
- DNumerous language barriers exist.
Correct Answer:
A
A

The primary challenge in enforcing criminal law in cybercrime cases revolves around jurisdiction issues. Since cybercrime often spans multiple countries, it's tricky to pin down who is responsible and which law enforcement can rightfully handle it. The fact that each country might have its own set of cyber laws only thickens the plot, making it problematic to discern applicable legal frameworks. This complexity significantly hinders the streamlined enforcement of laws against cybercriminals.
send
light_mode
delete
Question #5
Wi-Fi Protected Access 2 (WPA2) provides users with a higher level of assurance that their data will remain protected by using which protocol?
- AExtensible Authentication Protocol (EAP)Most Voted
- BInternet Protocol Security (IPsec)
- CSecure Sockets Layer (SSL)
- DSecure Shell (SSH)
Correct Answer:
A
A

The Extensible Authentication Protocol (EAP), utilized by Wi-Fi Protected Access 2 (WPA2), enhances data protection by supporting multiple authentication methods within a wireless network. Unlike other protocols like IPsec, SSL, or SSH, EAP is adaptable with various authentication mechanisms, making it integral in ensuring that data remains secure under the robust security provisions of WPA2. Understanding how EAP functions within WPA2 is crucial for effectively implementing and managing secure wireless networks in any IT security framework.
send
light_mode
delete
Question #6
Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?
- AReference monitor
- BTrusted Computing Base (TCB)
- CTime separation
- DSecurity kernelMost Voted
Correct Answer:
A
A

The correct answer to the question is indeed A, the Reference Monitor. This part of an operating system acts as a pivotal mediator, checking the interactions between subjects (like users or processes) and objects (such as files or databases). It ensures that all access requests are validated against defined security policies before any operation is permitted. The Reference Monitor enforces access controls, making it essential for maintaining system security by preventing unauthorized access, aligning with its description in established CISSP study guides. Thus, it serves as a crucial component within the Trusted Computing Base (TCB) by upholding security integrity throughout the computing environment.
send
light_mode
delete
Question #7
What process facilitates the balance of operational and economic costs of protective measures with gains in mission capability?
- APerformance testing
- BRisk assessment
- CSecurity audit
- DRisk managementMost Voted
Correct Answer:
D
D

Risk management is indeed the correct process for balancing operational and economic costs of protective measures with gains in mission capability. It involves a systematic approach to identify, assess, and prioritize risks while considering the cost-effectiveness of mitigation strategies. Implementing risk management allows organizations to make informed decisions on resource allocation, ensuring that investments in security are both justified and aligned with their mission objectives. This careful balancing act supports the overall goal of enhancing mission capability through well-calculated protective measures.
send
light_mode
delete
Question #8
Clothing retailer employees are provisioned with user accounts that provide access to resources at partner businesses. All partner businesses use common identity and access management (IAM) protocols and differing technologies. Under the Extended Identity principle, what is the process flow between partner businesses to allow this IAM action?
- AClothing retailer acts as User Self Service, confirms identity of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to services.
- BClothing retailer acts as identity provider (IdP), confirms identity of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to services.Most Voted
- CClothing retailer acts as Service Provider, confirms identity of user using industry standards, then sends credentials to partner businesses that act as an identity provider (IdP) and allows access to resources.
- DClothing retailer acts as Access Control Provider, confirms access of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to resources.
Correct Answer:
B
B

In the context of the Extended Identity principle, the correct answer is B. Here the clothing retailer essentially acts as the identity provider (IdP) for its employees, confirming their identities using prevailing industry standards like SAML, OAuth, or OpenID Connect. Subsequently, the established identities facilitate the employees' access to services at partner businesses, which function as Service Providers (SPs). This streamlined identity and access management process ensures that employees can utilize resources across various platforms without the burden of multiple accounts, aligning with efficient IAM protocols.
send
light_mode
delete
Question #9
Which of the following statements BEST describes least privilege principle in a cloud environment?
- AA single cloud administrator is configured to access core functions.Most Voted
- BInternet traffic is inspected for all incoming and outgoing packets.
- CRouting configurations are regularly updated with the latest routes.
- DNetwork segments remain private if unneeded to access the internet.
Correct Answer:
D
D
send
light_mode
delete
Question #10
An organization has been collecting a large amount of redundant and unusable data and filling up the storage area network (SAN). Management has requested the identification of a solution that will address ongoing storage problems. Which is the BEST technical solution?
- ACompression
- BCaching
- CReplication
- DDeduplicationMost Voted
Correct Answer:
A
A

Compression is indeed the most suitable solution given the context of the question. The choice of compression over deduplication, as correctly pointed out in one of the comments, hinges on the type of data issue described—redundant and unusable data does not explicitly imply duplicate data, thus deduplication might not be effective if there are no exact duplicates. Compression, on the other hand, reduces the size of each individual file without needing them to be duplicates, addressing the storage limitation effectively by making the most of available space. This solution also avoids potential risks associated with deduplication such as data loss if the single instance of the data becomes corrupted.
send
light_mode
delete
All Pages