CISSP Security Assessment Testing Security Operations Exam Set 1

Which of the following is NOT a common backup method?


Options are :

  • Full backup method
  • Daily backup method (Correct)
  • Incremental backup method
  • Differential backup method

Answer :Daily backup method

CISSP Security Engineering Certification Practical Exam Set 10

Which of the following questions is less likely to help in assessing an organization's contingency planning controls?


Options are :

  • Is damaged media stored and/or destroyed? (Correct)
  • s the location of stored backups identified?
  • Is there an up-to-date copy of the plan stored securely off-site?
  • Are the backup storage site and alternate site geographically far enough from the primary site?

Answer :Is damaged media stored and/or destroyed?

A Differential backup process:


Options are :

  • Backs up data labeled with archive bit 0 and leaves the data labeled as archive bit 0
  • Backs up data labeled with archive bit 1 and leaves the data labeled as archive bit 1 (Correct)
  • Backs up data labeled with archive bit 1 and changes the data label to archive bit 0
  • Backs up data labeled with archive bit 0 and changes the data label to archive bit 1

Answer :Backs up data labeled with archive bit 1 and leaves the data labeled as archive bit 1

Which of the following backup methods is most appropriate for off-site archiving?


Options are :

  • Off-site backup method
  • Incremental backup method
  • Full backup method (Correct)
  • Differential backup method

Answer :Full backup method

CISSP Security Engineering Certification Practice Exam Set 8

Which of the following is a NOT a guideline necessary to enhance security in the critical Heating Ventilation Air Conditioning (HVAC) aspect of facility operations?


Options are :

  • Restrict access to main air intake points to persons who have a work-related reason to be there
  • Ensure that all air intake points are adequately secured with locking devices
  • Escort all contractors with access to the system while on site
  • Maintain access rosters of maintenance personnel who are not authorized to work on the system (Correct)

Answer :Maintain access rosters of maintenance personnel who are not authorized to work on the system

The Orange Book states that "Hardware and software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB [Trusted Computing Base]." This statement is the formal requirement for:


Options are :

  • System Architecture Specification.
  • Security Testing.
  • System Integrity. (Correct)
  • Design Verification.

Answer :System Integrity.

When you update records in multiple locations or you make a copy of the whole database at a remote location as a way to achieve the proper level of fault-tolerance and redundancy, it is known as?


Options are :

  • Shadowing (Correct)
  • Backup
  • Archiving
  • Data mirroring

Answer :Shadowing

CISSP Security Engineering Certification Practical Exam Set 6

A Business Continuity Plan should be tested:


Options are :

  • At least once every two years.
  • At least once a year (Correct)
  • Once a month.
  • At least twice a year.

Answer :At least once a year

Which of the following enables the person responsible for contingency planning to focus risk management efforts and resources in a prioritized manner only on the identified risks?


Options are :

  • Risk assessment (Correct)
  • Residual risks
  • Business units
  • Security controls

Answer :Risk assessment

Failure of a contingency plan is usually:


Options are :

  • Because of a lack of awareness.
  • Because of a lack of training.
  • A management failure. (Correct)
  • A technical failure.

Answer :A management failure.

CISSP - Mock Questions with all domains

Which common backup method is the fastest on a daily basis?


Options are :

  • Fast backup method
  • Incremental backup method (Correct)
  • Differential backup method
  • Full backup method

Answer :Incremental backup method

Which of the following steps should be one of the FIRST steps performed in a Business Impact Analysis (BIA)?


Options are :

  • Estimate the Recovery Time Objectives (RTO).
  • Evaluate the impact of disruptive events.
  • dentify all CRITICAL business units within the organization.
  • Identify and Prioritize Critical Organization Functions (Correct)

Answer :Identify and Prioritize Critical Organization Functions

What assesses potential loss that could be caused by a disaster?


Options are :

  • The Business Continuity Plan (BCP)
  • The Business Assessment (BA)
  • The Risk Assessment (RA)
  • The Business Impact Analysis (BIA) (Correct)

Answer :The Business Impact Analysis (BIA)

CISSP - Software Development Security Mock Questions

A server farm consisting of multiple similar servers seen as a single IP address from users interacting with the group of servers is an example of which of the following?


Options are :

  • Multiple servers
  • Redundant servers
  • Server clustering (Correct)
  • Server fault tolerance

Answer :Server clustering

Which of the following is most concerned with personnel security?


Options are :

  • Human resources controls
  • Technical controls
  • Operational controls (Correct)
  • Management controls

Answer :Operational controls

What is the MOST critical piece to disaster recovery and continuity planning?


Options are :

  • Security policy
  • Availability of backup information processing facilities
  • Management support (Correct)
  • Staff trainin

Answer :Management support

CISSP Security Engineering Certification Practical Exam Set 2

The MOST common threat that impacts a business's ability to function normally is:


Options are :

  • Water Damag
  • Labor Strike
  • Severe Weather
  • Power Outage (Correct)

Answer :Power Outage

What can be defined as the maximum acceptable length of time that elapses before the unavailability of the system severely affects the organization?


Options are :

  • Recovery Point Objectives (RPO)
  • Recovery Time Period (RTP)
  • Recovery Time Objectives (RTO) (Correct)
  • Critical Recovery Time (CRT)

Answer :Recovery Time Objectives (RTO)

Which of the following best defines a Computer Security Incident Response Team (CSIRT)?


Options are :

  • An organization that coordinates and supports the response to security incidents. (Correct)
  • An organization that provides a secure channel for receiving reports about suspected security incidents.
  • An organization that ensures that security incidents are reported to the authorities.
  • An organization that disseminates incident-related information to its constituency and other involved parties.

Answer :An organization that coordinates and supports the response to security incidents.

CISSP Security Engineering Certification Practical Exam Set 7

Which of the following is a large hardware/software backup system that uses the RAID technology?


Options are :

  • Crimson Array
  • Table Array
  • Tape Array. (Correct)
  • Scale Array.

Answer :Tape Array.

Considerations of privacy, invasiveness, and psychological and physical comfort when using the system are important elements for which of the following?


Options are :

  • Adaptability of biometrics systems
  • Availability of biometrics systems
  • Acceptability of biometrics systems (Correct)
  • Accountability of biometrics systems

Answer :Acceptability of biometrics systems

A business continuity plan should list and prioritize the services that need to be brought back after a disaster strikes. Which of the following services is more likely to be of primary concern in the context of what your Disaster Recovery Plan would include?


Options are :

  • Facilities security
  • Marketing/Public relations
  • Data/Telecomm/IS facilities (Correct)
  • IS Operations

Answer :Data/Telecomm/IS facilities

CISSP Security Engineering Certification Practical Exam Set 2

Which of the following server contingency solutions offers the highest availability?


Options are :

  • Electronic vaulting/remote journaling
  • Redundant arrays of independent disks (RAID)
  • Load balancing/disk replication (Correct)
  • System backups

Answer :Load balancing/disk replication

A site that is owned by the company and mirrors the original production site is referred to as a _______?


Options are :

  • Warm Site.
  • Redundant Site. (Correct)
  • Hot site.
  • Reciprocal site.

Answer :Redundant Site.

Prior to a live disaster test also called a Full Interruption test, which of the following is most important?


Options are :

  • Restore all files in preparation for the test
  • Arrange physical security for the test site.
  • Conduct of a successful Parallel Test (Correct)
  • Document expected findings.

Answer :Conduct of a successful Parallel Test

CISSP Security Engineering Certification Practice Exam Set 4

Which of the following teams should NOT be included in an organization's contingency plan?


Options are :

  • Legal affairs team
  • Tiger team (Correct)
  • Hardware salvage team
  • Damage assessment team

Answer :Tiger team

Recovery Site Strategies for the technology environment depend on how much downtime an organization can tolerate before the recovery must be completed. What would you call a strategy where the alternate site is internal, standby ready, with all the technology and equipment necessary to run the applications?


Options are :

  • Dual Data Center
  • External Hot site
  • Warm Sit
  • Internal Hot Site (Correct)

Answer :Internal Hot Site

Covert Channel Analysis is FIRST introduced at what level of the TCSEC rating?


Options are :

  • B1 and above.
  • B3 and above.
  • C2 and above.
  • B2 and above (Correct)

Answer :B2 and above

CISSP Security Engineering Certification Practical Exam Set 1

Which of the following is defined as the most recent point in time to which data must be synchronized without adversely affecting the organization (financial or operational impacts)?


Options are :

  • Critical Time Objective
  • Recovery Point Objective (Correct)
  • Recovery Time Objective
  • Point of Time Objective

Answer :Recovery Point Objective

Which of the following is less likely to accompany a contingency plan, either within the plan itself or in the form of an appendix?


Options are :

  • Equipment and system requirements lists of the hardware, software, firmware and other resources required to support system operations.
  • Vendor contact information, including offsite storage and alternate site.
  • The Business Impact Analysis.
  • Contact information for all personnel. (Correct)

Answer :Contact information for all personnel.

During the testing of the business continuity plan (BCP), which of the following methods of results analysis provides the BEST assurance that the plan is workable?


Options are :

  • Measurement of accuracy
  • Quantitatively measuring the results of the test (Correct)
  • Elapsed time for completion of critical tasks
  • Evaluation of the observed test results

Answer :Quantitatively measuring the results of the test

CISSP Security Engineering Certification Practical Exam Set 1

If an organization were to monitor their employees' e-mail, it should not:


Options are :

  • Monitor only a limited number of employees. (Correct)
  • Explain what is considered an acceptable use of the e-mail system
  • Inform all employees that e-mail is being monitored.
  • Explain who can read the e-mail and how long it is backed up.

Answer :Monitor only a limited number of employees.

The Orange Book requires auditing mechanisms for any systems evaluated at which of the following levels?


Options are :

  • C1 and above.
  • B2 and above.
  • C2 and above. (Correct)
  • B1 and above.

Answer :C2 and above.

Which of the following is BEST defined as a physical control?


Options are :

  • Monitoring of system activity
  • Logical access control mechanisms
  • Fencing (Correct)
  • Identification and authentication methods

Answer :Fencing

CISSP Security Engineering Certification Practical Exam Set 8

Which of the following backup sites is the most effective for disaster recovery


Options are :

  • Time brokers
  • Reciprocal Agreement
  • Hot sites (Correct)
  • Cold sites

Answer :Hot sites

Which of the following statements pertaining to the maintenance of an IT contingency plan is incorrect?


Options are :

  • The plan should be reviewed at least once a year for accuracy and completeness.
  • Copies of the plan should be provided to recovery personnel for storage offline at home and office.
  • The Contingency Planning Coordinator should make sure that every employee gets an up-to-date copy of the plan. (Correct)
  • Strict version control should be maintained

Answer :The Contingency Planning Coordinator should make sure that every employee gets an up-to-date copy of the plan.

The first step in the implementation of the contingency plan is to perform:


Options are :

  • An operating systems software backup
  • A firmware backup
  • A data backup (Correct)
  • An application software backup

Answer :A data backup

CISSP Security Engineering Certification Practice Exam Set 10

Which of the following is the most critical item from a disaster recovery point of view?


Options are :

  • Software Applications
  • Hardware/Software
  • Communication Links
  • Data (Correct)

Answer :Data

Which of the following item would best help an organization to gain a common understanding of functions that are critical to its survival?


Options are :

  • A disaster recovery plan
  • A business assessment
  • A risk assessment
  • A business impact analysis (Correct)

Answer :A business impact analysis

If an employee's computer has been used by a fraudulent employee to commit a crime, the hard disk may be seized as evidence and once the investigation is complete it would follow the normal steps of the Evidence Life Cycle. In such case, the Evidence life cycle would not include which of the following steps listed below?


Options are :

  • Storage, preservation, and transportation
  • Destruction (Correct)
  • Analysis
  • Acquisition collection and identification

Answer :Destruction

CISSP Security Engineering Certification Practical Exam Set 2

Which of the following is a transaction redundancy implementation?


Options are :

  • Remote Journaling
  • Electronic Vaulting
  • Database Shadowing
  • On-site mirroring (Correct)

Answer :On-site mirroring

Organizations should not view disaster recovery as which of the following?


Options are :

  • Enforcement of legal statutes.
  • Discretionary expense (Correct)
  • Committed expense.
  • Compliance with regulations

Answer :Discretionary expense

Which of the following statements pertaining to RAID technologies is incorrect?


Options are :

  • RAID-4 uses dedicated parity.
  • RAID-0 relies solely on striping.
  • RAID-3 uses byte-level striping with dedicated parity.
  • RAID-5 has a higher performance in read/write speeds than the other levels (Correct)

Answer :RAID-5 has a higher performance in read/write speeds than the other levels

CISSP Security Engineering Certification Practice Exam Set 7

Which of the following statements regarding an off-site information processing facility is TRUE?


Options are :

  • It should have the same amount of physical access restrictions as the primary processing site. (Correct)
  • Need not have the same level of environmental monitoring as the originating site since this would be cost prohibitive.
  • It should be located in proximity to the originating site so that it can quickly be made operational.
  • t should be easily identified from the outside so in the event of an emergency it can be easily found.

Answer :It should have the same amount of physical access restrictions as the primary processing site.

Which of the following rules pertaining to a Business Continuity Plan/Disaster Recovery Plan is incorrect?


Options are :

  • In order to facilitate recovery, a single plan should cover all locations (Correct)
  • In its procedures and tasks, the plan should refer to functions, not specific individuals.
  • Critical vendors should be contacted ahead of time to validate equipment can be obtained in a timely manner.
  • There should be requirements to form a committee to decide a course of action. These decisions should be made ahead of time and incorporated into the plan.

Answer :In order to facilitate recovery, a single plan should cover all locations

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions