CISSP-ISSAP Information Systems Security Architecture Exam Set 4

Which of the following life cycle modeling activities establishes service relationships and message

exchange paths?


Options are :

  • Service-oriented business integration modeling
  • Service-oriented conceptual architecture modeling
  • Service-oriented discovery and analysis modeling
  • Service-oriented logical design modeling (Correct)

Answer : Service-oriented logical design modeling

The OSI model is the most common networking model used in the industry. Applications, network

functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the

following, choose the two best statements that describe the OSI layer functions. Each correct

answer represents a complete solution. Choose two.

A. Layers 1 and 2 deal with application functionality and data formatting. These layers reside at

the top of the model.

B. Layers 4 through 7 define the functionality of IP Addressing, Physical Standards, and Data Link

protocols.

C. Layers 5, 6, and 7 focus on the Network Application, which includes data formatting and

session control.

D. Layers 1, 2, 3, and 4 deal with physical connectivity, encapsulation, IP Addressing, and Error

Recovery. These layers define the end-to-end functions of data delivery.


Options are :

  • C,D (Correct)
  • B,D
  • B,C
  • A,B

Answer : C,D

What are the benefits of using AAA security service in a network? Each correct answer represents

a part of the solution. Choose all that apply.

A. It provides scalability.

B. It supports a single backup system.

C. It increases flexibility and control of access configuration.

D. It supports RADIUS, TACACS+, and Kerberos authentication methods.


Options are :

  • AB,C
  • C,D,A
  • D,C,A
  • A,C,D (Correct)

Answer : A,C,D

CISSP Security Engineering Certification Practical Exam Set 10

Which of the following security protocols provides confidentiality, integrity, and authentication of

network traffic with end-to-end and intermediate-hop security?


Options are :

  • IPSec
  • SWIPE (Correct)
  • SET
  • SKIP

Answer : SWIPE

Mark works as a Network Administrator for NetTech Inc. He wants to connect the company's

headquarter and its regional offices using a WAN technology. For this, he uses packet-switched

connection. Which of the following WAN technologies will Mark use to connect the offices? Each

correct answer represents a complete solution. Choose two.

A. ISDN

B. X.25

C. Frame Relay

D. Leased line


Options are :

  • D,C
  • A,B
  • B,C (Correct)
  • B,D

Answer : B,C

You work as a Project Manager for Tech Perfect Inc. You are creating a document which

emphasizes the formal study of what your organization is doing currently and where it will be in the

future. Which of the following analysis will help you in accomplishing the task?


Options are :

  • Requirement analysis
  • Cost-benefit analysis
  • Vulnerability analysis
  • Gap analysis (Correct)

Answer : Gap analysis

CISSP Security Engineering Certification Practice Exam Set 10

You are calculating the Annualized Loss Expectancy (ALE) using the following formula: ALE=AV *

EF * ARO What information does the AV (Asset Value) convey?


Options are :

  • It is expected loss for an asset due to a risk over a one year period.
  • It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs. (Correct)
  • It represents the percentage of loss that an asset experiences if an anticipated threat occurs.
  • It represents how many times per year a specific threat occurs.

Answer : It represents the total cost of an asset, including the purchase price, recurring maintenance, expenses, and all other costs.

In which of the following access control models can a user not grant permissions to other users to

see a copy of an object marked as secret that he has received, unless they have the appropriate

permissions?


Options are :

  • Mandatory Access Control (MAC) (Correct)
  • Access Control List (ACL)
  • Role Based Access Control (RBAC)
  • Discretionary Access Control (DAC)

Answer : Mandatory Access Control (MAC)

John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based

network. John has been assigned a project to build a network for the sales department of the

company. It is important for the LAN to continue working even if there is a break in the cabling.

Which of the following topologies should John use to accomplish the task?


Options are :

  • Ring
  • Star
  • Mesh (Correct)
  • Bus

Answer : Mesh

CISSP Security Engineering Certification Practice Exam Set 7

Which of the following schemes is used by the Kerberos authentication?


Options are :

  • OPIE
  • Public key cryptography
  • Private key cryptography (Correct)
  • One time password

Answer : Private key cryptography

Which of the following protocols work at the Network layer of the OSI model?

A. Routing Information Protocol (RIP)

B. File Transfer Protocol (FTP)

C. Simple Network Management Protocol (SNMP)

D. Internet Group Management Protocol (IGMP)


Options are :

  • D,B
  • C,A
  • B,C
  • A,D (Correct)

Answer : A,D

You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for

the company. Which of the following devices will you use to physically connect the computers in

the VLAN? Each correct answer represents a complete solution. Choose two.

A. Switch

B. Router

C. Bridge

D. Hub E. Repeater


Options are :

  • A,B (Correct)
  • B,C
  • C,A
  • D,B

Answer : A,B

CISSP-ISSEP Information Systems Security Engineering Exam Set 7

Which of the following types of ciphers are included in the historical ciphers? Each correct answer

represents a complete solution. Choose two.

A. Block ciphers

B. Transposition ciphers

C. Stream ciphers

D. Substitution ciphers


Options are :

  • C,D
  • B,C
  • B,D (Correct)
  • A,B

Answer : B,D

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT

centers for the district they will need to be able to work from an alternate location. However,

budget is an issue. Which of the following is most appropriate for this client?


Options are :

  • Off site
  • Warm site
  • Hot site
  • Cold site (Correct)

Answer : Cold site

In which of the following SDLC phases are the software and other components of the system

faithfully incorporated into the design specifications?


Options are :

  • Initiation
  • Definition
  • Evaluation and acceptance
  • Programming and training (Correct)

Answer : Programming and training

CISSP - Mock Questions with all domains

Which of the following keys is derived from a preshared key and Extensible Authentication

Protocol (EAP)?


Options are :

  • Group Temporal Key
  • Pairwise Transient Key
  • Private Key
  • Pairwise Master Key (Correct)

Answer : Pairwise Master Key

Fill in the blank with the appropriate security method. ____________ is a system, which enables


an authority to control access to areas and resources in a given physical facility, or computer-

based information system.


Options are :

  • Access control (Correct)

Answer : Access control

The network you administer allows owners of objects to manage the access to those objects via

access control lists. This is an example of what type of access control?


Options are :

  • CIA
  • DAC (Correct)
  • RBAC
  • MAC

Answer : DAC

CISSP Security Engineering Certification Practical Exam Set 1

Which of the following protocols provides certificate-based authentication for virtual private

networks (VPNs)?


Options are :

  • L2TP (Correct)
  • HTTPS
  • SMTP
  • PPTP

Answer : L2TP

You work as an Incident handling manager for Orangesect Inc. You detect a virus attack incident

in the network of your company. You develop a signature based on the characteristics of the

detected virus. Which of the following phases in the Incident handling process will utilize the

signature to resolve this incident?


Options are :

  • Eradication (Correct)
  • Containment
  • Identification
  • Recovery

Answer : Eradication

In software development, which of the following analysis is used to document the services and

functions that have been accidentally left out, deliberately eliminated or still need to be developed?


Options are :

  • Requirement analysis
  • Gap analysis (Correct)
  • Cost-benefit analysis
  • Vulnerability analysis

Answer : Gap analysis

CISSP - Security and Risk Management Pratice Questions

SSH is a network protocol that allows data to be exchanged between two networks using a secure

channel. Which of the following encryption algorithms can be used by the SSH protocol? Each

correct answer represents a complete solution. Choose all that apply.

A. Blowfish

B. DES

C. IDEA

D. RC4


Options are :

  • D,C,B
  • C,B,A
  • B,C,A
  • A,B,C (Correct)

Answer : A,B,C

You work as a Network Administrator for NetTech Inc. When you enter http://66.111.64.227 in the

browser's address bar, you are able to access the site. But, you are unable to access the site

when you enter http://www.company.com. What is the most likely cause?


Options are :

  • The site's Web server has heavy traffic.
  • The site's Web server is offline.
  • WINS server has no NetBIOS name entry for the server.
  • DNS entry is not available for the host name. (Correct)

Answer : DNS entry is not available for the host name.

Which of the following protocols provides connectionless integrity and data origin authentication of

IP packets?


Options are :

  • ISAKMP
  • AH (Correct)
  • IKE
  • ESP

Answer : AH

CISSP - Software Development Security Mock Questions

You are implementing some security services in an organization, such as smart cards, biometrics,

access control lists, firewalls, intrusion detection systems, and clipping levels. Which of the

following categories of implementation of the access control includes all these security services?


Options are :

  • Logical access control (Correct)
  • Physical access control
  • Preventive access control
  • Administrative access control

Answer : Logical access control

Which of the following devices is a least expensive power protection device for filtering the

electrical stream to control power surges, noise, power sags, and power spikes?


Options are :

  • Expansion Bus
  • Uninterrupted Power Supply (UPS) (Correct)
  • Surge Suppressor
  • Line Conditioner

Answer : Uninterrupted Power Supply (UPS)

Which of the following processes is used to identify relationships between mission critical

applications, processes, and operations and all supporting elements?


Options are :

  • Critical path analysis (Correct)
  • Functional analysis
  • Business impact analysis
  • Risk analysis

Answer : Critical path analysis

CISSP Security and Risk Management Certified Practice Exam Set 3

Which of the following encryption algorithms are based on block ciphers?

A. RC4

B. Twofish

C. Rijndael

D. RC5


Options are :

  • B,C,D
  • B,C,D (Correct)
  • A,B,C
  • C,B,D

Answer : B,C,D

Which of the following processes identifies the threats that can impact the business continuity of

operations?


Options are :

  • Business impact analysis (Correct)
  • Requirement analysis
  • Function analysis
  • Risk analysis

Answer : Business impact analysis

An authentication method uses smart cards as well as usernames and passwords for

authentication. Which of the following authentication methods is being referred to?


Options are :

  • Anonymous
  • Mutual
  • Multi-factor (Correct)
  • Biometrics

Answer : Multi-factor

CISSP Communication and Network Security Practice Exam Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now