Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > ISC > ISC Certifications > CISSP > CISSP Online Practice Questions and Answers

CISSP Online Practice Questions and Answers

Questions 4

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.

Which of the following is the BEST way to prevent future occurrences?

A. Remove the anonymity from the proxy

B. Analyze Internet Protocol (IP) traffic for proxy requests

C. Disable the proxy server on the firewall

D. Block the Internet Protocol (IP) address of known anonymous proxies

Buy Now

Correct Answer: D

Questions 5

Why do certificate Authorities (CA) add value to the security of electronic commerce transactions?

A. They maintain the certificate revocation list.

B. They maintain the private keys of transition parties.

C. They verify the transaction parties' private keys.

D. They provide a secure communication enamel to the transaction parties.

Buy Now

Correct Answer: D

Questions 6

Which of the following access management procedures would minimize the possibility of an organization's employees retaining access to secure werk areas after they change roles?

A. User access modification

B. user access recertification

C. User access termination

D. User access provisioning

Buy Now

Correct Answer: B

Questions 7

In a change-controlled environment, which of the following is MOST likely to lead to unauthorized changes to production programs?

A. Modifying source code without approval

B. Promoting programs to production without approval

C. Developers checking out source code without approval

D. Developers using Rapid Application Development (RAD) methodologies without approval

Buy Now

Correct Answer: B

Questions 8

Which of the following is critical for establishing an initial baseline for software components in the operation and maintenance of applications?

A. Application monitoring procedures

B. Configuration control procedures

C. Security audit procedures

D. Software patching procedures

Buy Now

Correct Answer: B

Questions 9

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

A. Development, testing, and deployment

B. Prevention, detection, and remediation

C. People, technology, and operations

D. Certification, accreditation, and monitoring

Buy Now

Correct Answer: C

Questions 10

Which of the following is established to collect information Se eee ee ee nation readily available in part through implemented security controls?

A. Security Assessment Report (SAR)

B. Organizational risk tolerance

C. Information Security Continuous Monitoring (ISCM) D. Risk assessment report

Buy Now

Correct Answer: D

Questions 11

An application developer receives a report back from the security team showing their automated tools were able to successfully enter unexpected data into the organization's customer service portal, causing the site to crash. This is an example of which type of testing?

A. Non-functional

B. Positive

C. Performance

D. Negative

Buy Now

Correct Answer: D

Questions 12

To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet.

Which of the following tools is the MOST appropriate to complete the assessment?

A. Use tcpdump and parse the output file in a protocol analyzer.

B. Use an IP scanner and target the cloud WAN network addressing

C. Run netstat in each cloud server and retrieve the running processes.

D. Use nmap and set the servers' public IPs as the targets.

Buy Now

Correct Answer: D

Questions 13

At which layer of the Open Systems Interconnection (OSI) model does a circuit-level firewall operate?

A. Session layer

B. Network layer

C. Application layer

D. Transport layer

Buy Now

Correct Answer: B

Reference: https://www.bmc.com/blogs/osi-model-7-layers/

Exam Code: CISSP
Exam Name: Certified Information Systems Security Professional (CISSP)
Last Update: Jun 10, 2025
Questions: 1703

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.