ISC CISSP Exam Practice Questions (P. 2)
- Full Access (484 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which Wide Area Network (WAN) technology requires the first router in the path to determine the full path the packet will travel, removing the need for other routers in the path to make independent determinations?
- ASynchronous Optical Networking (SONET)
- BMultiprotocol Label Switching (MPLS)Most Voted
- CFiber Channel Over Ethernet (FCoE)
- DSession Initiation Protocol (SIP)
Correct Answer:
B
B

MPLS, or Multiprotocol Label Switching, indeed simplifies the routing process by using predetermined paths, essentially making routing decisions at the outset of entering the network. This initial decision comprises defining labels that guide the packet through a fixed path, reducing the need for subsequent decision-making by routers along the way. This functionality is analogous to planning a route before embarking on a journey, where once the main roads are determined, there's no need to re-evaluate options at every turn. This results in faster data flow and consistent packet routing across the network.
send
light_mode
delete
Question #12
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
- AFile Integrity CheckerMost Voted
- BSecurity information and event management (SIEM) system
- CAudit Logs
- DIntrusion detection system (IDS)
Correct Answer:
A
A

The correct choice for recognizing changes to content, including unauthorized changes, is indeed a File Integrity Checker. This tool is designed specifically to monitor and validate file integrity by comparing the current state of files against a known, good baseline. This comparison includes attributes like file size, timestamps, and checksums, which helps pinpoint unauthorized modifications. While SIEM systems do track and analyze security data, their main role isn't directly focused on file integrity but rather on a broader spectrum of event management and log analysis.
send
light_mode
delete
Question #13
Which of the following is included in change management?
- ATechnical review by business owner
- BUser Acceptance Testing (UAT) before implementationMost Voted
- CCost-benefit analysis (CBA) after implementation
- DBusiness continuity testing
Correct Answer:
D
D

User Acceptance Testing (UAT) is an essential component of change management as it ensures that any changes meet the necessary business requirements and are operationally functional before full implementation. UAT minimizes the risks associated with deploying new changes by catching potential issues early, enabling adjustments based on feedback, and confirming system performances meet expectations. While business continuity testing and other options have their roles, UAT stands out for directly engaging with end-user validation and approval in the change management process, aligning closely with its goals to optimize system updates and prevent operational disruptions.
send
light_mode
delete
Question #14
A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed. The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor?
- APinning
- BSingle-pass wipe
- CMulti-pass wipesMost Voted
- DDegaussing
Correct Answer:
C
C

Opting for multi-pass wipes ensures that data on hard drives is overwritten multiple times, greatly reducing the likelihood of any data recovery, even with sophisticated tools. This method adheres to strict security guidelines while preserving the drive's functionality, allowing the company to gain maximum resale value from the vendor as the drives remain operational. This choice balances security with economic benefits, making it the best choice for scenarios where both factors are crucial.
send
light_mode
delete
Question #15
When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess?
- ASOC 1 Type 1
- BSOC 2 Type 1
- CSOC 2 Type 2Most Voted
- DSOC 3
Correct Answer:
C
C

The correct choice is SOC 2 Type 2. This is because Type 2 not only reviews the design of the controls (as Type 1 does) but importantly also assesses their operational effectiveness over time, typically a twelve-month period. This extended review period provides a more comprehensive understanding of how effectively the vendor manages data security and privacy on an ongoing basis. This type of certification is pivotal for ensuring that stringent data protection standards are maintained consistently, making it the best choice when data security and privacy are critical concerns for your company.
send
light_mode
delete
Question #16
Which application type is considered high risk and provides a common way for malware and viruses to enter a network?
- AInstant messaging or chat applications
- BPeer-to-Peer (P2P) file sharing applicationsMost Voted
- CE-mail applications
- DEnd-to-end applications
Correct Answer:
B
B

Peer-to-Peer (P2P) file sharing applications pose a significant risk due to their open nature, which frequently bypasses traditional network security measures. This type of application offers an easy pathway for the dissemination of malware, including spyware, viruses, Trojan horses, and worms. These security threats exploit the decentralized sharing and downloading of files, making P2P a high-risk application type for network security.
send
light_mode
delete
Question #17
An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference architecture would mobile devices be tracked?
send
light_mode
delete
Question #18
Which of the following is the BEST way to protect an organization's data assets?
- AEncrypt data in transit and at rest using up-to-date cryptographic algorithms.
- BMonitor and enforce adherence to security policies.Most Voted
- CRequire Multi-Factor Authentication (MFA) and Separation of Duties (SoD).
- DCreate the Demilitarized Zone (DMZ) with proxies, firewalls and hardened bastion hosts.
Correct Answer:
A
A
send
light_mode
delete
Question #19
Within a large organization, what business unit is BEST positioned to initiate provisioning and deprovisioning of user accounts?
- ATraining department
- BInternal audit
- CHuman resourcesMost Voted
- DInformation technology (IT)
Correct Answer:
C
C
send
light_mode
delete
Question #20
Which of the following is the PRIMARY purpose of installing a mantrap within a facility?
- AControl traffic
- BControl air flow
- CPrevent piggybackingMost Voted
- DPrevent rapid movement
Correct Answer:
C
C
send
light_mode
delete
All Pages