ISC CISSP Practice Exams
Last updated on Apr 01,2025- Exam Code: CISSP
- Exam Name: Certified Information Systems Security Professional
- Certification Provider: ISC
- Latest update: Apr 01,2025
A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies .
Which of the following is the BEST solution for the manufacturing organization?
- A . Trusted third-party certification
- B . Lightweight Directory Access Protocol (LDAP)
- C . Security Assertion Markup language (SAML)
- D . Cross-certification
An organization is designing a large enterprise-wide document repository system. They plan to have several different classification level areas with increasing levels of controls.
The BEST way to ensure document confidentiality in the repository is to
- A . encrypt the contents of the repository and document any exceptions to that requirement.
- B . utilize Intrusion Detection System (IDS) set drop connections if too many requests for documents are detected.
- C . keep individuals with access to high security areas from saving those documents into lower security areas.
- D . require individuals with access to the system to sign Non-Disclosure Agreements (NDA).
Which of the following actions should be performed when implementing a change to a database schema in a production system?
- A . Test in development, determine dates, notify users, and implement in production
- B . Apply change to production, run in parallel, finalize change in production, and develop a back-out strategy
- C . Perform user acceptance testing in production, have users sign off, and finalize change
- D . Change in development, perform user acceptance testing, develop a back-out strategy, and implement change
The BEST method of demonstrating a company’s security level to potential customers is
- A . a report from an external auditor.
- B . responding to a customer’s security questionnaire.
- C . a formal report from an internal auditor.
- D . a site visit by a customer’s security team.
The birthday attack is MOST effective against which one of the following cipher technologies?
- A . Chaining block encryption
- B . Asymmetric cryptography
- C . Cryptographic hash
- D . Streaming cryptography
When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?
- A . Only when assets are clearly defined
- B . Only when standards are defined
- C . Only when controls are put in place
- D . Only procedures are defined
A disadvantage of an application filtering firewall is that it can lead to
- A . a crash of the network as a result of user activities.
- B . performance degradation due to the rules applied.
- C . loss of packets on the network due to insufficient bandwidth.
- D . Internet Protocol (IP) spoofing by hackers.
Which of the following is MOST important when assigning ownership of an asset to a department?
- A . The department should report to the business owner
- B . Ownership of the asset should be periodically reviewed
- C . Individual accountability should be ensured
- D . All members should be trained on their responsibilities
Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
- A . Layer 2 Tunneling Protocol (L2TP)
- B . Link Control Protocol (LCP)
- C . Challenge Handshake Authentication Protocol (CHAP)
- D . Packet Transfer Protocol (PTP)
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
- A . Guaranteed recovery of all business functions
- B . Minimization of the need decision making during a crisis
- C . Insurance against litigation following a disaster
- D . Protection from loss of organization resources