Free Practice Test

Free CISSP Practice Test

ISC2 CISSP Free Exam Questions

Disclaimer

Please keep a note that the demo questions are not frequently updated. You may as well find them in open communities around the web. However, this demo is only to depict what sort of questions you may find in our original files.

Nonetheless, the premium exam dumps files are frequently updated and are based on the latest exam syllabus and real exam questions.

1 / 60

An organization would like to implement an authorization mechanism that would simplify the assignment of various system access permissions for many users with similar job responsibilities. Which type of authorization mechanism would be the BEST choice for the organization to implement?

2 / 60

Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?

3 / 60

Clothing retailer employees are provisioned with user accounts that provide access to resources at partner businesses. All partner businesses use common identity and access management (IAM) protocols and differing technologies. Under the Extended Identity principle, what is the process flow between partner businesses to allow this IAM action?

4 / 60

Which of the following statements BEST describes least privilege principle in a cloud environment?

5 / 60

Which of the following is included in change management?

6 / 60

When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization Controls (SOC) certification for the vendor to possess?

7 / 60

An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference architecture would mobile devices be tracked?

8 / 60

Within a large organization, what business unit is BEST positioned to initiate provisioning and deprovisioning of user accounts?

9 / 60

Which of the following is the BEST method to validate secure coding techniques against injection and overflow attacks?

10 / 60

In the "Do" phase of the Plan-Do-Check-Act model, which of the following is performed?

11 / 60

When resolving ethical conflicts, the information security professional MUST consider many factors. In what order should the considerations be prioritized?

12 / 60

An organization recently suffered from a web-application attack that resulted in stolen user session cookie information. The attacker was able to obtain the information when a user's browser executed a script upon visiting a compromised website. What type of attack MOST likely occurred?

13 / 60

What is the term used to define where data is geographically stored in the cloud?

14 / 60

Which of the following is MOST important to follow when developing information security controls for an organization?

15 / 60

Which of the following attacks, if successful, could give an intruder complete control of a software-defined networking (SDN) architecture?

16 / 60

The security architect is designing and implementing an internal certification authority to generate digital certificates for all employees. Which of the following is the
BEST solution to securely store the private keys?

17 / 60

A hospital enforces the Code of Fair Information Practices. What practice applies to a patient requesting their medical records from a web portal?

18 / 60

A security architect is developing an information system for a client. One of the requirements is to deliver a platform that mitigates against common vulnerabilities and attacks. What is the MOST efficient option used to prevent buffer overflow attacks?

19 / 60

In a quarterly system access review, an active privileged account was discovered that did not exist in the prior review on the production system. The account was created one hour after the previous access review. Which of the following is the BEST option to reduce overall risk in addition to quarterly access reviews?

20 / 60

Which of the following is the MOST appropriate control for asset data labeling procedures?

21 / 60

An organization is setting a security assessment scope with the goal of developing a Security Management Program (SMP). The next step is to select an approach for conducting the risk assessment. Which of the following approaches is MOST effective for the SMP?

22 / 60

Which of the following BEST describes centralized identity management?

23 / 60

The acquisition of personal data being obtained by a lawful and fair means is an example of what principle?

24 / 60

What level of Redundant Array of Independent Disks (RAID) is configured PRIMARILY for high-performance data reads and writes?

25 / 60

An enterprise is developing a baseline cybersecurity standard its suppliers must meet before being awarded a contract. Which of the following statements is TRUE about the baseline cybersecurity standard?

26 / 60

Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?

27 / 60

What is the correct order of execution for security architecture?

28 / 60

An authentication system that uses challenge and response was recently implemented on an organization's network, because the organization conducted an annual penetration test showing that testers were able to move laterally using authenticated credentials. Which attack method was MOST likely used to achieve this?

29 / 60

Which of the following is performed to determine a measure of success of a security awareness training program designed to prevent social engineering attacks?

30 / 60

Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?

31 / 60

Which of the following BEST describes the purpose of software forensics?

32 / 60

What process facilitates the balance of operational and economic costs of protective measures with gains in mission capability?

33 / 60

What is the PRIMARY reason for criminal law being difficult to enforce when dealing with cybercrime?

34 / 60

Which of the following is the BEST way to protect an organization's data assets?

35 / 60

A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed. The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor?

36 / 60

A company is attempting to enhance the security of its user authentication processes. After evaluating several options, the company has decided to utilize Identity as a Service (IDaaS). Which of the following factors leads the company to choose an IDaaS as their solution?

37 / 60

When recovering from an outage, what is the Recovery Point Objective (RPO), in terms of data recovery?

38 / 60

Which of the following does the security design process ensure within the System Development Life Cycle (SDLC)?

39 / 60

In software development, which of the following entities normally signs the code to protect the code integrity?

40 / 60

The existence of physical barriers, card and personal identification number (PIN) access systems, cameras, alarms, and security guards BEST describes this security approach?

41 / 60

Which of the following BEST describes when an organization should conduct a black box security audit on a new software protect?

42 / 60

What is considered the BEST explanation when determining whether to provide remote network access to a third-party security service?

43 / 60

Which of the following is the BEST option to reduce the network attack surface of a system?

44 / 60

A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place?

45 / 60

To monitor the security of buried data lines inside the perimeter of a facility, which of the following is the MOST effective control?

46 / 60

International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?

47 / 60

Dumpster diving is a technique used in which stage of penetration testing methodology?

48 / 60

Which one of the following BEST protects vendor accounts that are used for emergency maintenance?

49 / 60

The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated?

50 / 60

A security professional needs to find a secure and efficient method of encrypting data on an endpoint. Which solution includes a root key?

51 / 60

Which of the following is the MOST effective strategy to prevent an attacker from disabling a network?

52 / 60

An application developer receives a report back from the security team showing their automated tools were able to successfully enter unexpected data into the organization's customer service portal, causing the site to crash. This is an example of which type of testing?

53 / 60

Using the cipher text and resultant cleartext message to derive the monoalphabetic cipher key is an example of which method of cryptanalytic attack?

54 / 60

In Federated Identity Management (FIM), which of the following represents the concept of federation?

55 / 60

What documentation is produced FIRST when performing an effective physical loss control process?

56 / 60

What is the MAIN purpose of a security assessment plan?

57 / 60

Which of the following is MOST appropriate to collect evidence of a zero-day attack?

58 / 60

The quality assurance (QA) department is short-staffed and is unable to test all modules before the anticipated release date of an application. What security control is MOST likely to be violated?

59 / 60

An organization has requested storage area network (SAN) disks for a new project. What Redundant Array of Independent Disks (RAID) level provides the BEST redundancy and fault tolerance?

60 / 60

An attack utilizing social engineering and a malicious Uniform Resource Locator (URL) link to take advantage of a victim's existing browser session with a web application is an example of which of the following types of attack?

Your score is

The average score is 56%

Shopping Cart
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail $6 DISCOUNT on YOUR PURCHASE