CISSP (Information Systems Security) Practice Tests 2019 Set 7

What type of reconnaissance attack provides attackers with useful information about the services running on a system?



Options are :

  • A. Session hijacking
  • D. IP sweep
  • C. Dumpster diving
  • B. Port scan

Answer : B. Port scan

How does a SYN flood attack work?



Options are :

  • B. Uses an amplification network to flood a victim with packets
  • C. Disrupts the three-way handshake used by TCP
  • D. Sends oversized ping packets to a victim
  • A. Exploits a packet processing glitch in Windows systems

Answer : C. Disrupts the three-way handshake used by TCP

CISSP Security Assessment Testing Security Operations Exam Set 5

Which one of the following attacks is most indicative of a terrorist

attack?



Options are :

  • B. Damaging the ability to communicate and respond to a physical attack
  • D. Transferring funds to other countries
  • A. Altering sensitive trade secret documents
  • C. Stealing unclassified information

Answer : B. Damaging the ability to communicate and respond to a physical attack

What portion of the change management process allows developers

to prioritize tasks?



Options are :

  • C. Request control
  • B. Configuration control
  • D. Change audit
  • A. Release control

Answer : C. Request control

Which one of the following alternative processing sites takes the longest time to activate?



Options are :

  • A. Hot site
  • B. Mobile site
  • C. Cold site
  • D. Warm site

Answer : C. Cold site

CISSP-ISSEP Information Systems Security Engineering Exam Set 6

What software development model uses a seven-stage approach with a feedback loop that allows progress one step backward?



Options are :

  • A. Boyce-Codd
  • C. Spiral
  • D. Agile
  • B. Waterfall

Answer : B. Waterfall

Why should you avoid deleting log files on a daily basis?



Options are :

  • C. Log files are protected and cannot be altered.
  • D. Any information in a log file is useless after it is several hours old.
  • B. Disk space is cheap, and log files are used frequently.
  • A. An incident may not be discovered for several days and valuable evidence could be lost.

Answer : A. An incident may not be discovered for several days and valuable evidence could be lost.

Which of the following actions are considered unacceptable and unethical according to RFC 1087, “Ethics and the Internet”?



Options are :

  • B. Actions that compromise the privacy of users
  • C. Actions that disrupt organizational activities
  • D. Actions in which a computer is used in a manner inconsistent with a stated security policy
  • A. Actions that compromise the privacy of classified information

Answer : B. Actions that compromise the privacy of users

CISSP Security Engineering Certification Practical Exam Set 8

Bob is developing a software application and has a field where users may enter a date. He wants to ensure that the values

provided by the users are accurate dates to prevent security issues. What technique should Bob use?



Options are :

  • C. Contamination
  • A. Polyinstantiation
  • B. Input validation
  • D. Screening

Answer : B. Input validation

What type of application vulnerability most directly allows an attacker to modify the contents of a system’s memory?



Options are :

  • B. Back door
  • A. Rootkit
  • C. TOC/TOU
  • D. Buffer overflow

Answer : D. Buffer overflow

Which one of the following is an example of a man-made disaster?



Options are :

  • C. Power outage
  • D. Lightning strike
  • A. Tsunami
  • B. Earthquake

Answer : C. Power outage

CISSP Security Engineering Certification Practice Exam Set 1

Which of the following would security personnel do during the remediation stage of an incident response?



Options are :

  • A. Contain the incident
  • C. Rebuild system
  • B. Collect evidence
  • D. Root cause analysis

Answer : D. Root cause analysis

What is the end goal of disaster recovery planning?



Options are :

  • C. Restoring normal business activity
  • D. Minimizing the impact of a disaster
  • A. Preventing business interruption
  • B. Setting up temporary business operations

Answer : C. Restoring normal business activity

Which one of the following is not a component of the DevOps model?



Options are :

  • D. IT operations
  • A. Information security
  • C. Quality assurance
  • B. Software development

Answer : A. Information security

CISSP - Security Operations Mock Questions

What approach to failure management places the system in a high

level of security?



Options are :

  • A. Fail-open
  • C. Fail-secure
  • B. Fail mitigation

Answer : C. Fail-secure

Which one of the following key types is used to enforce referential integrity between database tables?



Options are :

  • A. Candidate key
  • D. Super key
  • C. Foreign key
  • B. Primary key

Answer : C. Foreign key

What type of a security control is an audit trail?



Options are :

  • A. Administrative
  • D. Physical
  • B. Detective
  • C. Corrective

Answer : B. Detective

CISSP - Software Development Security Mock Questions

Which one of the following tools provides a solution to the problem of users forgetting complex passwords?



Options are :

  • A. LastPass
  • D. Tripwire
  • B. Crack
  • C. Shadow password files

Answer : A. LastPass

What character should always be treated carefully when encountered as user input on a web form?



Options are :

  • C. *
  • B. &
  • D. '
  • A. !

Answer : D. '

Of the following choices, what is the best form of anti-malware protection?



Options are :

  • B. A single solution throughout the organization
  • A. Multiple solutions on each system
  • C. Anti-malware protection at several locations
  • D. One-hundred-percent content filtering at all border gateways

Answer : C. Anti-malware protection at several locations

CISSP Security Engineering Certification Practice Exam Set 7

What is the most important rule to follow when collecting evidence?



Options are :

  • A. Do not turn off a computer until you photograph the screen.
  • D. Transfer all equipment to a secure storage location.
  • C. Never modify evidence during the collection process.
  • B. List all people present while collecting evidence.

Answer : C. Never modify evidence during the collection process.

Which one of the following investigation types has the highest standard of evidence?



Options are :

  • A. Administrative
  • D. Regulatory
  • B. Civil
  • C. Criminal

Answer : C. Criminal

In what type of software testing does the tester have access to the underlying source code?



Options are :

  • C. Cross-site scripting testing
  • B. Dynamic testing
  • A. Static testing
  • D. Black-box testing

Answer : A. Static testing

CISSP Security Engineering Certification Practice Exam Set 8

A web server hosted on the internet was recently attacked, exploiting a vulnerability in the operating system. The operating system vendor assisted in the incident investigation and verified that the vulnerability was not previously known. What type of attack was this?



Options are :

  • C. Denial of service
  • B. Zero-day exploit
  • A. Botnet
  • D. Distributed denial of service

Answer : B. Zero-day exploit

If you need to confiscate a PC from a suspected attacker who does not work for your organization, what legal avenue is most appropriate?



Options are :

  • C. No legal avenue is necessary.
  • D. Voluntary consent.
  • A. Consent agreement signed by employees.
  • B. Search warrant.

Answer : B. Search warrant.

Which one of the following types of attacks relies on the difference between the timing of two events?



Options are :

  • D. Fraggle
  • C. Land
  • B. TOCTOU
  • A. Smurf

Answer : B. TOCTOU

CISSP - Software Development Security Mock Questions

What step of the Electronic Discovery Reference Model ensures that information that may be subject to discovery is not altered?



Options are :

  • D. Presentation
  • C. Processing
  • B. Production
  • A. Preservation

Answer : A. Preservation

Which of the following focuses more on the patterns and trends of data than on the actual content?



Options are :

  • A. Keystroke monitoring
  • C. Event logging
  • B. Traffic analysis
  • D. Security auditing

Answer : B. Traffic analysis

What does the term “100-year flood plain” mean to emergency preparedness officials?



Options are :

  • A. The last flood of any kind to hit the area was more than 100 years ago.
  • B. The odds of a flood at this level are 1 in 100 in any given year.
  • C. The area is expected to be safe from flooding for at least 100 years.
  • D. The last significant flood to hit the area was more than 100 years ago.

Answer : B. The odds of a flood at this level are 1 in 100 in any given year.

CISSP - Security Operations Mock Questions

Which one of the following is not a principle of Agile development?



Options are :

  • D. Prioritize security over other requirements.
  • C. Pay continuous attention to technical excellence.
  • A. Satisfy the customer through early and continuous delivery.
  • B. Businesspeople and developers work together.

Answer : D. Prioritize security over other requirements.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now