CISSP-ISSAP Information Systems Security Architecture Exam Set 2

Which of the following elements of planning gap measures the gap between the total potential for

the market and the actual current usage by all the consumers in the market?

Options are :

  • Project gap
  • Product gap
  • None of the Above
  • Competitive gap
  • Usage gap

Answer : Usage gap

CISSP - Software Development Security Mock Questions

Which of the following statements about Public Key Infrastructure (PKI) are true? Each correct

answer represents a complete solution. Choose two.

A. It uses symmetric key pairs.

B. It provides security using data encryption and digital signature.

C. It uses asymmetric key pairs.

D. It is a digital representation of information that identifies users.

Options are :

  • B,C
  • D,C
  • A,B
  • B,D

Answer : B,C

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote

users to connect and access its private network through a dial-up connection via the Internet. All

the data will be sent across a public network. For security reasons, the management wants the

data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling

Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

Options are :

  • IP Security (IPSec)
  • Microsoft Point-to-Point Encryption (MPPE)
  • Pretty Good Privacy (PGP)
  • Data Encryption Standard (DES)

Answer : IP Security (IPSec)

Which of the following terms refers to the method that allows or restricts specific types of packets

from crossing over the firewall?

Options are :

  • Web caching
  • Packet filtering
  • Spoofing
  • Hacking

Answer : Packet filtering

CISSP Security Engineering Certification Practical Exam Set 7

Which of the following is the duration of time and a service level within which a business process

must be restored after a disaster in order to avoid unacceptable consequences associated with a

break in business continuity?

Options are :

  • RTO
  • RTA
  • RPO
  • RCO

Answer : RTO

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel? Each

correct answer represents a complete solution. Choose two.




D. RC4

Options are :

  • B,C
  • C,D
  • A,B
  • D,A

Answer : A,B

Which of the following is used to authenticate asymmetric keys?

Options are :

  • MAC Address
  • Digital signature
  • Demilitarized zone (DMZ
  • Password

Answer : Digital signature

CISSP - Software Development Security Mock Questions

Which of the following protocols uses public-key cryptography to authenticate the remote


Options are :

  • Telnet
  • SSL
  • SSH
  • SCP

Answer : SSH

Maria works as a Network Security Officer for Gentech Inc. She wants to encrypt her network

traffic. The specific requirement for the encryption algorithm is that it must be a symmetric key

block cipher. Which of the following techniques will she use to fulfill this requirement?

Options are :

  • AES
  • IDEA
  • PGP
  • DES

Answer : DES

Which of the following tenets does the CIA triad provide for which security practices are

measured? Each correct answer represents a part of the solution. Choose all that apply.

A. Integrity

B. Accountability

C. Availability

D. Confidentiality

Options are :

  • A,C,D
  • A,B,C
  • C,D,B
  • B,C,A

Answer : A,C,D

CISSP-ISSEP Information Systems Security Engineering Exam Set 4

Which of the following disaster recovery tests includes the operations that shut down at the

primary site, and are shifted to the recovery site according to the disaster recovery plan?

Options are :

  • Full-interruption test
  • Simulation test
  • Structured walk-through test
  • Parallel test

Answer : Full-interruption test

CISSP - Security and Risk Management Pratice Questions

Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security

associations (SA)?

Options are :

  • LEAP
  • IPSec
  • L2TP

Answer : ISAKMP

You are the Network Administrator for a college. You watch a large number of people (some not

even students) going in and out of areas with campus computers (libraries, computer labs, etc.).

You have had a problem with laptops being stolen. What is the most cost effective method to

prevent this?

Options are :

  • Use laptop locks.
  • Video surveillance on all areas with computers.
  • Appoint a security guard.
  • Smart card access to all areas with computers.

Answer : Use laptop locks.

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it

against an established baseline?

Options are :

  • File-based
  • Anomaly-based
  • Signature-based
  • Network-based

Answer : Anomaly-based

CISSP Security Engineering Certification Practice Exam Set 2

You have been assigned the task of selecting a hash algorithm. The algorithm will be specifically

used to ensure the integrity of certain sensitive files. It must use a 128 bit hash value. Which of the

following should you use?

Options are :

  • AES
  • DES
  • MD5
  • SHA

Answer : MD5

The ATM of a bank is robbed by breaking the ATM machine. Which of the following physical

security devices can now be used for verification and historical analysis of the ATM robbery?

Options are :

  • Biometric devices
  • CCTV Cameras
  • Key card
  • Intrusion detection systems

Answer : CCTV Cameras

In your office, you are building a new wireless network that contains Windows 2003 servers. To

establish a network for secure communication, you have to implement IPSec security policy on the

servers. What authentication methods can you use for this implementation? Each correct answer

represents a complete solution. Choose all that apply.

A. Public-key cryptography

B. Kerberos

C. Preshared keys

D. Digital certificates

Options are :

  • D,C,B
  • B,C,D
  • C,B,A
  • A,B,C

Answer : B,C,D

CISSP-ISSAP Information Systems Security Architecture Exam Set 5

An organization wants to allow a certificate authority to gain access to the encrypted data and

create digital signatures on behalf of the user. The data is encrypted using the public key from a

user's certificate. Which of the following processes fulfills the above requirements?

Options are :

  • Key escrow
  • Key revocation
  • Key recovery
  • Key storage

Answer : Key escrow

The service-oriented modeling framework (SOMF) provides a common modeling notation to

address alignment between business and IT organizations. Which of the following principles does

the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that


A. Disaster recovery planning

B. SOA value proposition

C. Software assets reuse

D. Architectural components abstraction

E. Business traceability

Options are :

  • E,B,D,C
  • D,C,B,E
  • A,B,C,D
  • B,C,D,E

Answer : B,C,D,E

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from

the company for personal reasons. He wants to send out some secret information of the company.

To do so, he takes an image file and simply uses a tool image hide and embeds the secret file

within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since

he is using the image file to send the data, the mail server of his company is unable to filter this

mail. Which of the following techniques is he performing to accomplish his task?

Options are :

  • Web ripping
  • Steganography
  • Email spoofing
  • Social engineering

Answer : Steganography

CISSP Security Engineering Certification Practice Exam Set 5

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following

tasks: Develop a risk-driven enterprise information security architecture. Deliver security

infrastructure solutions that support critical business initiatives. Which of the following methods will

you use to accomplish these tasks?

Options are :

  • Sherwood Applied Business Security Architecture
  • Service-oriented architecture
  • Service-oriented modeling and architecture
  • Service-oriented modeling framework

Answer : Sherwood Applied Business Security Architecture

The IPSec protocol is configured in an organization's network in order to maintain a complete

infrastructure for secured network communications. IPSec uses four components for this. Which of

the following components reduces the size of data transmitted over congested network

connections and increases the speed of such networks without losing data?

Options are :

  • AH
  • ESP
  • IKE
  • IPcomp

Answer : IPcomp

Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the

TCP/IP model?

Options are :

  • The session layer
  • The transport layer
  • The presentation layer
  • The application layer

Answer : The transport layer

CISSP - Software Development Security Mock Questions

Which of the following is an electrical event shows that there is enough power on the grid to

prevent from a total power loss but there is no enough power to meet the current electrical


Options are :

  • Brownout
  • Blackout
  • Power Spike
  • Power Surge

Answer : Brownout

Which of the following can be configured so that when an alarm is activated, all doors lock and the

suspect or intruder is caught between the doors in the dead-space?

Options are :

  • Network Intrusion Detection System (NIDS)
  • Host Intrusion Detection System (HIDS)
  • Biometric device
  • Man trap

Answer : Man trap

Which of the following should the administrator ensure during the test of a disaster recovery plan?

A. Ensure that the plan works properly

B. Ensure that all the servers in the organization are shut down.

C. Ensure that each member of the disaster recovery team is aware of their responsibility.

D. Ensure that all client computers in the organization are shut down.

Options are :

  • B,D
  • D,C
  • A,C
  • A,B

Answer : A,C

CISSP (Information Systems Security) Practice Tests 2019 Set 1

Which of the following types of attacks is often performed by looking surreptitiously at the

keyboard or monitor of an employee's computer?

Options are :

  • Buffer-overflow attack
  • Denial-of-Service (DoS) attack
  • Shoulder surfing attack
  • Man-in-the-middle attack

Answer : Shoulder surfing attack

Which of the following encryption modes can make protocols without integrity protection even

more susceptible to replay attacks, since each block gets decrypted in exactly the same way?

Options are :

  • Cipher block chaining mode
  • Cipher feedback mode
  • Output feedback mode
  • Electronic codebook mode

Answer : Electronic codebook mode

A helpdesk technician received a phone call from an administrator at a remote branch office. The

administrator claimed to have forgotten the password for the root account on UNIX servers and

asked for it. Although the technician didn't know any administrator at the branch office, the guy

sounded really friendly and since he knew the root password himself, he supplied the caller with

the password. What type of attack has just occurred?

Options are :

  • Brute Force attack
  • Replay attack
  • War dialing attack
  • Social Engineering attack

Answer : Social Engineering attack

CISSP - Software Development Security Mock Questions

Mark has been hired by a company to work as a Network Assistant. He is assigned the task to

configure a dial-up connection. He is configuring a laptop. Which of the following protocols should

he disable to ensure that the password is encrypted during remote access?

Options are :

  • PAP
  • SPAP

Answer : PAP

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now