Q: 1
The network you administer allows owners of objects to manage the access to those objects via
access control lists. This is an example of what type of access control?
Options
Discussion
D fits because object owners set permissions in DAC models using ACLs. Saw similar wording in the official guide and some practice tests. Pretty sure RBAC and MAC don't give that level of owner control. Disagree?
Be respectful. No spam.
Q: 2
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The
company has two offices in different cities. The company wants to connect the two offices by using a
public network. You decide to configure a virtual private network (VPN) between the offices. Which
of the following protocols is used by VPN for tunneling?
Options
Discussion
A. but not totally sure if it should be L2TP or IPSec here. L2TP is for tunneling right? Can someone confirm?
Totally get the confusion-L2TP (A) is the actual tunneling protocol, while IPSec adds encryption. For VPN tunneling, L2TP is the one meant for that role. Pretty sure that's what the question's after here.
Be respectful. No spam.
Q: 3
John works as a security manager for SoftTech Inc. He is working with his team on the disaster
recovery management plan. One of his team members has a doubt related to the most cost effective
DRP testing plan. According to you, which of the following disaster recovery testing plans is the most
cost-effective and efficient way to identify areas of overlap in the plan before conducting more
demanding training exercises?
Options
Discussion
B
C tbh. B is commonly picked by mistake but the structured walk-through (C) is the standard CISSP answer for a cost-effective first step before big drills. Full-scale (D) eats up way more resources. Check most exam reports if in doubt.
I'm a bit confused but I'd pick B. Walk-through drill. Sounds less expensive than the others to me, but not totally sure.
Be respectful. No spam.
Q: 4
In which of the following SDLC phases are the software and other components of the system
faithfully incorporated into the design specifications?
Options
Discussion
A
A, Seen this type of wording before in some practice sets, pretty sure A is the right phase where implementation happens.
Be respectful. No spam.
Q: 5
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You have a disaster scenario and you
want to discuss it with your team members for getting appropriate responses of the disaster. In
which of the following disaster recovery tests can this task be performed?
Options
Discussion
C tbh, simulation test fits the "discussion-based disaster scenario" part.
Be respectful. No spam.
Q: 6
Which of the following heights of fence deters only casual trespassers?
Options
Discussion
Option B, nice clear-cut question, matches what I've seen on similar prep exams.
Official guide mentions this height for casual deterrence, so worth reviewing that and any physical security tables in study materials.
Had something like this in a mock exam. B is the usual standard for fences that just mark boundaries and keep out people who aren't serious about getting in. Anything higher starts acting as an actual barrier. Pretty sure it's B.
Be respectful. No spam.
Q: 7
In which of the following types of tests are the disaster recovery checklists distributed to the
members of disaster recovery team and asked to review the assigned checklist?
Options
Discussion
C or D but pretty sure it's D, simulation test is often the trap here.
I think it might actually be B, simulation test. There's some overlap because both checklist and simulation tests involve reviewing roles, but simulations also review assigned procedures with team input. I've seen similar wording in practice where simulation is a trap if you focus too much on the 'review' part. Happy to be corrected if I'm missing something.
Its D. Seen similar topics in the official guide and practice tests, checklist test is always matched with distributing and reviewing docs.
Be respectful. No spam.
Q: 8
Which of the following encryption modes has the property to allow many error correcting codes to
function normally even when applied before encryption?
Options
Discussion
Maybe C. I thought CBC mode would work for error correction since errors in one ciphertext block only affect the decryption of that block and the next, not the whole message. That seems helpful for some ECCs. Pretty sure that's right but open to being corrected if I'm missing something.
Be respectful. No spam.
Q: 9
Which of the following is an electrical event shows that there is enough power on the grid to prevent
from a total power loss but there is no enough power to meet the current electrical demand?
Options
Discussion
D imo. Saw a similar scenario in the official guide and some practice tests, pretty sure brownout is what they mean.
Probably D. Had something like this in a mock and brownout means not enough voltage but still some power, so the grid hasn't totally failed. Blackout would be a full outage. Pretty sure brownout is right here, correct me if I'm off.
Really clear question, appreciate that. I'd pick C, blackout. Blackout usually means a total loss, but sometimes it's used loosely for power shortages. I think it fits if the grid can't meet demand. Not 100% on this though.
Be respectful. No spam.
Q: 10
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
Options
Discussion
Had something like this in a mock, it's C. Tunneling lets remote users create secure VPN connections back to the network after connecting to the Internet. Packet filtering and the others don't provide that direct secure tunnel. Agree?
C , tunneling is what's behind VPNs for remote access. It lets users reach internal resources securely after connecting to the Internet. Official study guide covers this well, worth reviewing VPN concepts for CISSP.
Maybe C, tunneling. VPNs create a secure tunnel so remote users can safely connect back in after they're online. Not totally sure since the question didn't specify encryption but tunneling fits best here I think.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2