CISSP-ISSAP Information Systems Security Architecture Exam Set 7

A network is configured on a Bus topology. Which of the following conditions could cause a

network failure? Each correct answer represents a complete solution. Choose all that apply.

A. A break in a network cable

B. 75 ohm terminators at open ends

C. A powered off workstation

D. An open-ended cable without terminators


Options are :

  • B,D,A
  • D,B,C
  • A,B,D
  • A,B,C

Answer : A,B,D

Computer networks and the Internet are the prime mode of Information transfer today. Which of

the following is a technique used for modifying messages, providing Information and Cyber

security, and reducing the risk of hacking attacks during communications and message passing

over the Internet?


Options are :

  • OODA loop
  • Firewall security
  • Cryptography
  • Risk analysis

Answer : Cryptography

CISSP - Security and Risk Management Pratice Questions

Sam is creating an e-commerce site. He wants a simple security solution that does not require

each customer to have an individual key. Which of the following encryption methods will he use?


Options are :

  • Asymmetric encryption
  • S/MIME
  • Symmetric encryption
  • PGP

Answer : Symmetric encryption

You want to connect a twisted pair cable segment to a fiber-optic cable segment. Which of the

following networking devices will you use to accomplish the task?


Options are :

  • Repeater
  • Switch
  • Hub
  • Router

Answer : Repeater

Which of the following are the initial steps required to perform a risk analysis process? Each

correct answer represents a part of the solution. Choose three.

A. Estimate the potential losses to assets by determining their value.

B. Establish the threats likelihood and regularity.

C. Valuations of the critical assets in hard costs.

D. Evaluate potential threats to the assets.


Options are :

  • B,C,A
  • A,B,C
  • D,B,C
  • A,B,D
  • None
  • None

Answer : A,B,D

CISSP Security Assessment Testing Security Operations Exam Set 1

You work as a technician for Trade Well Inc. The company is in the business of share trading. To

enhance security, the company wants users to provide a third key (apart from ID and password) to

access the company's Web site. Which of the following technologies will you implement to

accomplish the task?


Options are :

  • VPN
  • Key fobs
  • Smart cards
  • Biometrics

Answer : Key fobs

Which of the following are the countermeasures against a man-in-the-middle attack? Each correct

answer represents a complete solution. Choose all that apply.

A. Using public key infrastructure authentication.

B. Using basic authentication.

C. Using Secret keys for authentication.

D. Using Off-channel verification.


Options are :

  • A,B,C
  • A,C,D
  • C,B,A
  • D,B,D

Answer : A,C,D

Kerberos is a computer network authentication protocol that allows individuals communicating

over a non-secure network to prove their identity to one another in a secure manner. Which of the

following statements are true about the Kerberos authentication scheme? Each correct answer

represents a complete solution. Choose all that apply.

A. Kerberos requires continuous availability of a central server.

B. Dictionary and brute force attacks on the initial TGS response to a client may reveal the

subject's passwords.

C. Kerberos builds on Asymmetric key cryptography and requires a trusted third party.

D. Kerberos requires the clocks of the involved hosts to be synchronized.


Options are :

  • A,B,C
  • C,B,A
  • A,B,D
  • C,D,A

Answer : A,B,D

CISSP - Software Development Security Mock Questions

An organization is seeking to implement a hot site and wants to maintain a live database server at

the backup site. Which of the following solutions will be the best for the organization?


Options are :

  • Transaction logging
  • Electronic vaulting
  • Remote journaling
  • Remote mirroring

Answer : Remote mirroring

Which of the following encryption methods does the SSL protocol use in order to provide

communication privacy, authentication, and message integrity? Each correct answer represents a

part of the solution. Choose two.

A. Public key

B. IPsec

C. MS-CHAP

D. Symmetric


Options are :

  • A,D
  • B,D
  • C,B
  • A,C

Answer : A,D

Which of the following refers to a location away from the computer center where document copies

and backup media are kept?


Options are :

  • Storage Area network
  • Off-site storage
  • On-site storage
  • Network attached storage

Answer : Off-site storage

CISSP Security Engineering Certification Practical Exam Set 8

You are the Network Administrator for a small business. You need a widely used, but highly

secure hashing algorithm. Which of the following should you choose?


Options are :

  • SHA
  • AES
  • CRC32
  • EAP

Answer : SHA

Which of the following protocols is designed to efficiently handle high-speed data over wide area

networks (WANs)?


Options are :

  • PPP
  • Frame relay
  • X.25
  • SLIP

Answer : Frame relay

Which of the following statements best describes a certification authority?


Options are :

  • A certification authority is a type of encryption that uses a public key and a private key pair for data encryption
  • A certification authority is a type of encryption that uses a single key to encrypt and decrypt data.
  • A certification authority is a technique to authenticate digital documents by using computer cryptography.
  • A certification authority is an entity that issues digital certificates for use by other parties.

Answer : A certification authority is an entity that issues digital certificates for use by other parties.

CISSP-ISSEP Information Systems Security Engineering Exam Set 1

You work as a Network Administrator of a TCP/IP network. You are having DNS resolution

problem. Which of the following utilities will you use to diagnose the problem?


Options are :

  • NSLOOKUP
  • TRACERT
  • IPCONFIG
  • PING

Answer : NSLOOKUP

Which of the following are the primary components of a discretionary access control (DAC)

model? Each correct answer represents a complete solution. Choose two.

A. User's group

B. File and data ownership

C. Smart card

D. Access rights and permissions


Options are :

  • B,D
  • B,A
  • B,C
  • A,B

Answer : B,D

In which of the following network topologies does the data travel around a loop in a single direction

and pass through each device?


Options are :

  • Mesh topology
  • Star topology
  • Ring topology
  • Tree topology

Answer : Ring topology

CISSP Security Assessment Testing Security Operations Exam Set 2

In which of the following alternative processing sites is the backup facility maintained in a constant

order, with a full complement of servers, workstations, and communication links ready to assume

the primary operations responsibility?


Options are :

  • Mobile Site
  • Cold Site
  • Hot Site
  • Warm Site

Answer : Hot Site

Which of the following is an input device that is used for controlling machines such as cranes,

trucks, underwater unmanned vehicles, wheelchairs, surveillance cameras, and zero turning

radius lawn mowers?


Options are :

  • Joystick
  • PS/2
  • Microphone
  • AGP

Answer : Joystick

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

A. Data service

B. Ticket-granting service

C. Account service

D. Authentication service


Options are :

  • B,D
  • B,C
  • C,D
  • A,B

Answer : B,D

CISSP (Information Systems Security) Practice Tests 2019 Set 4

In which of the following cryptographic attacking techniques does an attacker obtain encrypted

messages that have been encrypted using the same encryption algorithm?


Options are :

  • Known plaintext attack
  • Chosen plaintext attack
  • Chosen ciphertext attack
  • Ciphertext only attack

Answer : Ciphertext only attack

CISSP - Security Operations Mock Questions

Which of the following LAN protocols use token passing for exchanging signals among various

stations on the network? Each correct answer represents a complete solution. Choose two.

A. Ethernet (IEEE 802.3)

B. Token ring (IEEE 802.5)

C. Fiber Distributed Data Interface (FDDI)

D. Wireless LAN (IEEE 802.11b)


Options are :

  • B,C
  • C,D
  • A,B
  • B,C

Answer : B,C

Which of the following keys are included in a certificate revocation list (CRL) of a public key

infrastructure (PKI)? Each correct answer represents a complete solution. Choose two.

A. A foreign key

B. A private key

C. A public key

D. A primary key


Options are :

  • A,C
  • B,C
  • C,D
  • A,B

Answer : B,C

A company named Money Builders Inc., hires you to provide consultancy for setting up their

Windows network. The company's server room will be in a highly secured environment. You are

required to suggest an authentication method for it. The CFO of the company wants the server to

use thumb impressions for authentication. Which of the following authentication methods will you

suggest?


Options are :

  • Two-factor
  • Smart card
  • Biometrics
  • Certificate

Answer : Biometrics

CISSP Security and Risk Management Certified Practice Exam Set 1

You work as a Network Administrator for Net Soft Inc. You are designing a data backup plan for

your company's network. The backup policy of the company requires high security and easy

recovery of data. Which of the following options will you choose to accomplish this?


Options are :

  • Take a full backup on Monday and an incremental backup on each of the following weekdays. Keep Monday's backup offsite.
  • Take a full backup daily with the previous night's tape taken offsite.
  • Take a full backup daily and use six-tape rotation
  • Take a full backup daily with one tape taken offsite weekly.
  • Take a full backup on alternate days and keep rotating the tapes.
  • Take a full backup on Monday and a differential backup on each of the following weekdays. Keep Monday's backup offsite.

Answer : Take a full backup daily with the previous night's tape taken offsite.

In which of the following cryptographic attacking techniques does the attacker pick up the

information to be encrypted and take a copy of it with the encrypted data?


Options are :

  • Chosen ciphertext attack
  • Known plaintext attack
  • Chosen plaintext attack
  • Ciphertext only attack

Answer : Chosen plaintext attack

In which of the following types of tests are the disaster recovery checklists distributed to the

members of disaster recovery team and asked to review the assigned checklist?


Options are :

  • Parallel test
  • Checklist test
  • Simulation test
  • Full-interruption test

Answer : Checklist test

CISSP-ISSEP Information Systems Security Engineering Exam Set 6

Which of the following are natural environmental threats that an organization faces? Each correct

answer represents a complete solution. Choose two.

A. Strikes

B. Floods

C. Accidents

D. Storms


Options are :

  • D,C
  • B,A
  • B,D
  • A,B

Answer : B,D

You are responsible for security at a hospital. Since many computers are accessed by multiple

employees 24 hours a day, 7 days a week, controlling physical access to computers is very

difficult. This is compounded by a high number of non employees moving through the building.

You are concerned about unauthorized access to patient records. What would best solve this

problem?


Options are :

  • Time of day restrictions.
  • The use of CHAP.
  • The use of smart cards.
  • Video surveillance of all computers.

Answer : The use of smart cards.

Which of the following encryption modes has the property to allow many error correcting codes to

function normally even when applied before encryption?


Options are :

  • PCBC mode
  • CBC mode
  • CFB mode
  • OFB mode

Answer : OFB mode

CISSP - Software Development Security Mock Questions

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions

Subscribe to See Videos

Subscribe to my Youtube channel for new videos : Subscribe Now