ISC CISSP Exam Practice Questions (P. 3)
- Full Access (484 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
In the "Do" phase of the Plan-Do-Check-Act model, which of the following is performed?
- AMaintain and improve the Business Continuity Management (BCM) system by taking corrective action, based on the results of management review.
- BMonitor and review performance against business continuity policy and objectives, report the results to management for review, and determine and authorize actions for remediation and improvement.
- CEnsure the business continuity policy, controls, processes, and procedures have been implemented.Most Voted
- DEnsure that business continuity policy, objectives, targets, controls, processes and procedures relevant to improving business continuity have been established.
Correct Answer:
C
C
send
light_mode
delete
Question #22
What industry-recognized document could be used as a baseline reference that is related to data security and business operations or conducting a security assessment?
- AService Organization Control (SOC) 1 Type 2
- BService Organization Control (SOC) 1 Type 1
- CService Organization Control (SOC) 2 Type 2
- DService Organization Control (SOC) 2 Type 1Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #23
A criminal organization is planning an attack on a government network. Which of the following scenarios presents the HIGHEST risk to the organization?
- AOrganization loses control of their network devices.Most Voted
- BNetwork is flooded with communication traffic by the attacker.
- CNetwork management communications is disrupted.
- DAttacker accesses sensitive information regarding the network topology.
Correct Answer:
A
A
send
light_mode
delete
Question #24
Which reporting type requires a service organization to describe its system and define its control objectives and controls that are relevant to users' internal control over financial reporting?
- AStatement on Auditing Standards (SAS) 70
- BService Organization Control 1 (SOC1)Most Voted
- CService Organization Control 2 (SOC2)
- DService Organization Control 3 (SOC3)
Correct Answer:
B
B
send
light_mode
delete
Question #25
Which of the following is the BEST method to validate secure coding techniques against injection and overflow attacks?
- AScheduled team review of coding style and techniques for vulnerability patterns
- BThe regular use of production code routines from similar applications already in use
- CUsing automated programs to test for the latest known vulnerability patternsMost Voted
- DEnsure code editing tools are updated against known vulnerability patterns
Correct Answer:
C
C
send
light_mode
delete
Question #26
When resolving ethical conflicts, the information security professional MUST consider many factors. In what order should the considerations be prioritized?
- APublic safety, duties to individuals, duties to the profession, and duties to principals
- BPublic safety, duties to principals, duties to the profession, and duties to individuals
- CPublic safety, duties to principals, duties to individuals, and duties to the professionMost Voted
- DPublic safety, duties to the profession, duties to principals, and duties to individuals
Correct Answer:
B
B
send
light_mode
delete
Question #27
Which service management process BEST helps information technology (IT) organizations with reducing cost, mitigating risk, and improving customer service?
- AKanban
- BLean Six Sigma
- CInformation Technology Service Management (ITSM)
- DInformation Technology Infrastructure Library (ITIL)Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #28
A company is attempting to enhance the security of its user authentication processes. After evaluating several options, the company has decided to utilize Identity as a Service (IDaaS). Which of the following factors leads the company to choose an IDaaS as their solution?
- AIn-house team lacks resources to support an on-premise solution.Most Voted
- BThird-party solutions are inherently more secure.
- CThird-party solutions are known for transferring the risk to the vendor.
- DIn-house development provides more control.
Correct Answer:
A
A
send
light_mode
delete
Question #29
An organization recently suffered from a web-application attack that resulted in stolen user session cookie information. The attacker was able to obtain the information when a user's browser executed a script upon visiting a compromised website. What type of attack MOST likely occurred?
- ASQL injection (SQLi)
- BExtensible Markup Language (XML) external entities
- CCross-Site Scripting (XSS)Most Voted
- DCross-Site Request Forgery (CSRF)
Correct Answer:
C
C
send
light_mode
delete
Question #30
An attack utilizing social engineering and a malicious Uniform Resource Locator (URL) link to take advantage of a victim's existing browser session with a web application is an example of which of the following types of attack?
- AClickjacking
- BCross-site request forgery (CSRF)Most Voted
- CCross-Site Scripting (XSS)
- DInjection
Correct Answer:
C
C
send
light_mode
delete
All Pages