Exam Code: is cissp worth it (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Information Systems Security Professional (CISSP)
Certification Provider: ISC2
Free Today! Guaranteed Training- Pass cissp bootcamp Exam.

Q61. Which of the following is the MOST important consideration.when.storing and processing.Personally Identifiable Information (PII)? 

A. Encrypt and hash all PII to avoid disclosure and tampering. 

B. Store PII for no more than one year. 

C. Avoid storing PII in a Cloud Service Provider. 

D. Adherence to collection limitation laws and regulations. 

Answer:


Q62. What is the MAIN feature that onion routing networks offer? 

A. Non-repudiation 

B. Traceability 

C. Anonymity 

D. Resilience 

Answer:


Q63. Why must all users be positively identified.prior.to using multi-user computers? 

A. To provide access to system privileges 

B. To provide access to the operating system 

C. To ensure that unauthorized persons cannot access the computers 

D. To ensure that management knows what users are currently logged on 

Answer:


Q64. Which of the following describes the BEST configuration management practice? 

A. After installing a new system, the configuration files are copied to a separate back-up system and hashed to detect tampering. 

B. After installing a new system, the configuration files are copied to an air-gapped system and hashed to detect tampering. 

C. The firewall rules are backed up to an air-gapped system. 

D. A baseline configuration is created and maintained for all relevant systems. 

Answer:


Q65. Which of the following is the MOST difficult to enforce when using cloud computing? 

A. Data access 

B. Data backup 

C. Data recovery 

D. Data disposal 

Answer:


Q66. For an organization considering two-factor authentication for secure network access, which of the following is MOST secure? 

A. Challenge response and private key 

B. Digital certificates and Single Sign-On (SSO) 

C. Tokens and passphrase 

D. Smart card and biometrics 

Answer:


Q67. What principle requires that changes to the plaintext affect many parts of the ciphertext? 

A. Diffusion 

B. Encapsulation 

C. Obfuscation 

D. Permutation 

Answer:


Q68. Single Sign-On (SSO) is PRIMARILY designed to address which of the following? 

A. Confidentiality and Integrity 

B. Availability and Accountability 

C. Integrity and Availability 

D. Accountability and Assurance 

Answer:


Q69. Which of the following is a potential risk when a program runs in privileged mode? 

A. It may serve to create unnecessary code complexity 

B. It may not enforce job separation duties 

C. It may create unnecessary application hardening 

D. It may allow malicious code to be inserted 

Answer:


Q70. Refer.to the information below to answer the question. 

An organization has hired an information security officer to lead their security department. The officer has adequate people resources but is lacking the other necessary components to have an effective security program. There are numerous initiatives requiring security involvement. 

Which of the following is considered the MOST important priority for the information security officer? 

A. Formal acceptance of the security strategy 

B. Disciplinary actions taken against unethical behavior 

C. Development of an awareness program for new employees 

D. Audit of all organization system configurations for faults 

Answer:


Q71. An organization has developed a major application that has undergone accreditation testing. After receiving the results of the evaluation, what is the final step before the application can be accredited? 

A. Acceptance of risk by the authorizing official 

B. Remediation of vulnerabilities 

C. Adoption of standardized policies and procedures 

D. Approval of the System Security Plan (SSP) 

Answer:


Q72. Which one of the following is a fundamental objective in handling an incident? 

A. To restore control of the affected systems 

B. To confiscate the suspect's computers 

C. To prosecute the attacker 

D. To perform full backups of the system 

Answer:


Q73. Refer.to the information below to answer the question. 

During the investigation of a security incident, it is determined that an unauthorized individual accessed a system which hosts a database containing financial information. 

If it is discovered that large quantities of information have been copied by the unauthorized individual, what attribute of the data has been compromised? 

A. Availability 

B. Integrity 

C. Accountability 

D. Confidentiality 

Answer:


Q74. What is the PRIMARY difference between security policies and security procedures? 

A. Policies are used to enforce violations, and procedures create penalties 

B. Policies point to guidelines, and procedures are more contractual in nature 

C. Policies are included in awareness training, and procedures give guidance 

D. Policies are generic in nature, and procedures contain operational details 

Answer:


Q75. Refer.to the information below to answer the question. 

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles. 

Which of the following will MOST likely allow the organization to keep risk at an acceptable level? 

A. Increasing the amount of audits performed by third parties 

B. Removing privileged accounts from operational staff 

C. Assigning privileged functions to appropriate staff 

D. Separating the security function into distinct roles 

Answer: