getcertified4sure.com

cissp study guide [Jan 2021]




Exam Code: cissp training (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Information Systems Security Professional (CISSP)
Certification Provider: ISC2
Free Today! Guaranteed Training- Pass cissp vs cisa Exam.

Q71. The process of mutual authentication involves a computer system authenticating a user and authenticating the 

A. user to the audit process. 

B. computer system to the user. 

C. user's access to all authorized objects. 

D. computer system to the audit process. 

Answer:


Q72. What is the BEST method to detect the most common improper initialization problems in programming languages? 

A. Use and specify a strong character encoding. 

B. Use automated static analysis tools that target this type of weakness. 

C. Perform input validation on any numeric inputs by assuring that they are within the expected range. 

D. Use data flow analysis to minimize the number of false positives. 

Answer:


Q73. Refer.to the information below to answer the question. 

A large organization uses unique identifiers and requires them at the start of every system session. Application access is based on job classification. The organization is subject to periodic independent reviews of access controls and violations. The organization uses wired and wireless networks and remote access. The organization also uses secure connections to branch offices and secure backup and recovery strategies for selected information and processes. 

In addition to authentication at the start of the user session, best practice would require re-authentication 

A. periodically during a session. 

B. for each business process. 

C. at system sign-off. 

D. after a period of inactivity. 

Answer:


Q74. Which of the following secures web transactions at the Transport Layer? 

A. Secure HyperText Transfer Protocol (S-HTTP) 

B. Secure Sockets Layer (SSL) 

C. Socket Security (SOCKS) 

D. Secure Shell (SSH) 

Answer:


Q75. DRAG DROP 

Match the objectives to the assessment questions in the governance domain of Software Assurance Maturity Model (SAMM). 

Answer: 


Q76. Refer.to the information below to answer the question. 

In a Multilevel Security (MLS) system, the following sensitivity labels are used in increasing levels of sensitivity: restricted, confidential, secret, top secret. Table A lists the clearance levels for four users, while Table B lists the security classes of four different files. 

In a Bell-LaPadula system, which user cannot write to File 3? 

A. User A 

B. User B 

C. User C 

D. User D 

Answer:


Q77. How does an organization verify that.an.information system's.current hardware and software match the standard system configuration? 

A. By reviewing the configuration after the system goes into production 

B. By running vulnerability scanning tools on all devices in the environment 

C. By comparing the actual configuration of the system against the baseline 

D. By verifying all the approved security patches are implemented 

Answer:


Q78. When is security personnel involvement in the Systems Development Life Cycle (SDLC) process MOST beneficial? 

A. Testing phase 

B. Development phase 

C. Requirements definition phase 

D. Operations and maintenance phase 

Answer:


Q79. During the procurement of a new information system, it was determined that some of the security requirements were not addressed in the system specification. Which of the following is the MOST likely reason for this? 

A. The procurement officer lacks technical knowledge. 

B. The security requirements have changed during the procurement process. 

C. There were no security professionals in the vendor's bidding team. 

D. The description of the security requirements was insufficient. 

Answer:


Q80. Which of the following protocols would allow an organization to maintain a centralized list of users that can read a protected webpage? 

A. Lightweight Directory Access Control (LDAP) 

B. Security Assertion Markup Language (SAML) 

C. Hypertext Transfer Protocol (HTTP) 

D. Kerberos 

Answer: