Cissp Exam Practice Questions
Cissp Exam Practice Questions
Cissp Exam Practice Questions
This book provides free CISSP questions covering over 2 sets exams
essentials approx. 600 CISSP questions without any charges, the purpose
providing CISSP questions is to give CISSP exam candidate a confidence with
what kind different types of questioned can be asked during the exam, the
question is designed covering all eight distinct domains.
About Exam
The CISSP certification is based on a Common Body of Knowledge (CBK)
identified by the (ISC)2 and defined through eight distinct domains, this book
will have assessment related to
Security and Risk Management
Asset Security
Security Engineering
Communications and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security
Exam Tips
Attempt All question DONOT leave any question.
Only 225 question counted toward your final score, the other 25 are
trial question for future version of CISSP examination
The CISSP question can also come on the situation
Answer simple question first and read through all of the answers
Each question is multiple-choice and includes four possible answers.
Only one answer is the best answer. Ideally, you should not only
know what the correct answer is, but also why it is correct and why
the incorrect answers are incorrect.
Twisted Questions
Drag & Drop Type of questions
Assessment Tests
1) Which of the following statement is not completely true when applying
governance policies
a. Security is Only IT issue.
b. Security is organizational process.
c. Security governance vary from organization to organization
d. Security governance should be managed throughout the
organization.
3) The radius protocol provides the AAA services what does these three
refer to in the CIA Triad when discussing the five elements of AAA.
a. Authentication, Availability, Adaptable, identification, accounting
b. Identification, Authentication, Authorization, Auditing, Accounting
c. Identification, Authentication, Nonrepudiation, Auditing,
Accounting
d. Nonrepudiation, Identification, Authentication, Authorization
4) Which of these three controls concepts applied for monitoring the
access.
a. SHA, RBAC, MAC
b. MAC, DAC, RBAC
c. MD5, DAC, RBAC
d. RBAC, SHA, MD5
5) The process of______ is maintained if the subject are held for ______
a. accountability, accountable
b. auditing, accountability
c. identification, auditing
d. identification, accountability
6) Which of the following is most likely not a mandatory document?
a. Standard
b. baseline
c. policy
d. None of the Above
7) Who led the InfoSec team?
a. CIO
b. CEO
c. CSO
d. Chairman
8) XYZ organization has an Infosec team, the XYZ is expanding and
growing, The organization XYZ has decided to increase the customer
base, and started the new project alpha, the Infosec team should not
do the following
a. InfoSec team started reporting under the project alpla
management
b. InfoSec team halt other security activities and give more
preference to project alpha
c. InfoSec team continue to work independently under the direction
of CSO and align with company mission and objectives
d. None of the Above
9) XYZ organization is practicing and implementing security policy which
of two legal terms describe the best match to it
a. due care
b. due diligence
c. both a & b
d. None of the above
10) Which one will be the right policy structure for an organization
following top down structure
a. B
b. A
c. C
d. None of the Above
15) You are working on Microsoft Excel and the excel warns you that a
document contains a macro.
a. Its a Virus
b. Its a Worm
c. Its not a Virus
d. Its a Trojan horse
16) A ___ is memory resident viruses and infect disks
a. File infector Virus
b. Master boot record viruses
c. Boot Sector Virus
d. Macro Virus