CISSP Security Assessment Testing Security Operations Exam Set 4

RAID levels 3 and 5 run:


Options are :

  • faster on software.
  • at the same speed on software and hardware.
  • slower on hardware.
  • faster on hardware.

Answer :faster on hardware.

The spare drives that replace the failed drives are usually hot swappable, meaning they can be replaced on the server in which of the following scenarios?


Options are :

  • system is up and in single-user-mode
  • system is up and running
  • system is quiesced but operational
  • system is idle but operational

Answer :system is up and running

CISSP - Security Engineering Mock Questions

Which backup method usually resets the archive bit on the files after they have been backed up?


Options are :

  • Tape backup method.
  • Partial backup method.
  • Differential backup method.
  • Incremental backup method.

Answer :Incremental backup method.

A Differential backup process will:


Options are :

  • Backs up data labeled with archive bit 1 and changes the data label to archive bit 0
  • Backs up data labeled with archive bit 0 and changes the data label to archive bit 1
  • Backs up data labeled with archive bit 0 and leaves the data labeled as archive bit 0
  • Backs up data labeled with archive bit 1 and leaves the data labeled as archive bit 1

Answer :Backs up data labeled with archive bit 1 and leaves the data labeled as archive bit 1

Which RAID level concept is considered more expensive and is applied to servers to create what is commonly known as server fault tolerance?


Options are :

  • RAID level 5
  • RAID level 2
  • RAID level 0
  • RAID level 1

Answer :RAID level 1

CISSP-ISSAP Information Systems Security Architecture Exam Set 5

Which RAID implementation is commonly called mirroring?


Options are :

  • RAID level 3
  • RAID level 2
  • RAID level 1
  • RAID level 5

Answer :RAID level 1

Which RAID implementation stripes data and parity at block level across all the drives?


Options are :

  • RAID level 2
  • RAID level 4
  • RAID level 5
  • RAID level 1

Answer :RAID level 5

Which of the following computer recovery sites is the least expensive and the most difficult to test?


Options are :

  • cold site.
  • warm site.
  • mobile hot site
  • non-mobile hot site.

Answer :cold site.

CISSP - Mock Questions with all domains

Who should direct short-term recovery actions immediately following a disaster?


Options are :

  • Chief Executive Officer.
  • Chief Information Officer.
  • Chief Operating Officer.
  • Disaster Recovery Manager.

Answer :Disaster Recovery Manager.

Ding Ltd. is a firm specialized in intellectual property business. A new video streaming application needs to be installed for the purpose of conducting the annual awareness program as per the firm security program. The application will stream internally copyrighted computer based training videos. The requirements for the application installation are to use a single server, low cost technologies, high performance and no high availability capacities. In regards to storage technology, what is the most suitable configuration for the server hard drives?


Options are :

  • RAID 1
  • Single hard disk (no RAID)
  • RAID 0
  • RAID 10

Answer :RAID 0

The main issue with RAID Level 1 is that the one-for-one ratio is:


Options are :

  • very expensive, resulting in the highest cost per megabyte of data capacity.
  • very unreliable resulting in a greater risk of losing data.
  • very inexpensive, resulting in the lowest cost per megabyte of data capacity.
  • quadruple server from the user's point of view.

Answer :very expensive, resulting in the highest cost per megabyte of data capacity.

CISSP - Software Development Security Mock Questions

When backing up an applications system's data, which of the following is a key question to be answered first?


Options are :

  • Where to keep backups.
  • How to store backups.
  • When to make backups.
  • What records to backup.

Answer :What records to backup.

Which of the following best describes what would be expected at a "hot site"?


Options are :

  • Computers, climate control, cables and peripherals
  • Computers and peripherals
  • Computers and dedicated climate control systems.
  • Dedicated climate control systems

Answer :Computers, climate control, cables and peripherals

What is the process that RAID Level 0 uses as it creates one large disk by using several disks?


Options are :

  • striping
  • clustering
  • mirroring
  • integrating

Answer :striping

CISSP - Security Engineering Mock Questions

Which of the following computer recovery sites is only partially equipped with processing equipment?


Options are :

  • warm site.
  • rolling hot site.
  • hot site.
  • cold site.

Answer :warm site.

Which of the following is NOT an example of a detective control?


Options are :

  • Motion detector
  • Backup data restore
  • IDS
  • System Monitor

Answer :Backup data restore

CISSP (Information Systems Security) Practice Tests 2019 Set 7

Which of the following control helps to identify an incidentís activities and potentially an intruder?


Options are :

  • Preventive
  • Detective
  • Compensating
  • Deterrent

Answer :Detective

Which of the following is NOT a form of detective technical control?


Options are :

  • Access control software
  • Intrusion detection system
  • Honeypot
  • Audit trails

Answer :Access control software

Which of the following answers best describes the type of penetration testing where the analyst has full knowledge of the network on which he is going to perform his test?


Options are :

  • Penetration Testing
  • White-Box Penetration Testing
  • Black-Box Pen Testing
  • Gray-Box Pen Testing

Answer :White-Box Penetration Testing

CISSP - Security Operations Mock Questions

An Intrusion Detection System (IDS) is what type of control?


Options are :

  • directive control.
  • A recovery control.
  • A preventive control.
  • A detective control.

Answer :A detective control.

Which of the following is NOT an example of an operational control?


Options are :

  • Contingency planning
  • Backup and recovery
  • Auditing
  • Operations procedures

Answer :Auditing

What is the most effective means of determining that controls are functioning properly within an operating system?


Options are :

  • Interview with computer operator
  • Review of software control features and/or parameters
  • Review of operating system manua
  • Interview with product vendor

Answer :Review of software control features and/or parameters

CISSP Security Engineering Certification Practical Exam Set 5

Operations Security seeks to PRIMARILY protect against which of the following?


Options are :

  • object reuse
  • compromising emanations
  • asset threats
  • facility disaster

Answer :asset threats

Which of the following statements pertaining to ethical hacking is NOT true?


Options are :

  • Ethical hackers never use tools that have the potential of affecting servers or services.
  • An organization should use ethical hackers who do not sell auditing, hardware, software, firewall, hosting, and/or networking services.
  • Testing should be done remotely to simulate external threats.
  • Ethical hacking should not involve writing to or modifying the target systems negatively.

Answer :Ethical hackers never use tools that have the potential of affecting servers or services.

Which of the following is NOT a technique used to perform a penetration test?


Options are :

  • war dialing
  • sniffing
  • scanning and probing
  • traffic padding

Answer :traffic padding

CISSP-ISSAP Information Systems Security Architecture Exam Set 3

Which of the following are required for Life-Cycle Assurance?


Options are :

  • Configuration Management and Trusted Facility Management
  • Security Testing and Trusted distribution
  • System Architecture and Design specification
  • Security Testing and Covert Channel Analysis

Answer :Security Testing and Trusted distribution

In what way can violation of clipping levels assist in violation tracking and analysis?


Options are :

  • Clipping levels enable the security administrator to customize the audit trail to record only actions for users with access to user accounts with a privileged status.
  • Clipping levels set a baseline for acceptable normal user errors, and violations exceeding that threshold will be recorded for analysis of why the violations occurred.
  • Clipping levels enable a security administrator to customize the audit trail to record only those violations which are deemed to be security relevant.
  • Clipping levels enable a security administrator to view all reductions in security levels which have been made to user accounts which have incurred violations.

Answer :Clipping levels set a baseline for acceptable normal user errors, and violations exceeding that threshold will be recorded for analysis of why the violations occurred.

Which of the following would provide the BEST stress testing environment taking under consideration and avoiding possible data exposure and leaks of sensitive data?


Options are :

  • Test environment using sanitized live workloads data.
  • Test environment using test data
  • Production environment using test data.
  • Production environment using sanitized live workloads data.

Answer :Test environment using sanitized live workloads data.

CISSP Security Engineering Certification Practice Exam Set 9

Which of the following is NOT a characteristic of a host-based intrusion detection system?


Options are :

  • A HIDS looks for unauthorized changes to the system
  • A HIDS does not consume large amounts of system resources
  • A HIDS can analyze system logs, processes and resources
  • A HIDS can notify system administrators when unusual events are identified

Answer :A HIDS does not consume large amounts of system resources

Which Orange Book evaluation level is described as "Structured Protection"?


Options are :

  • B2
  • B3
  • A1
  • B1

Answer :B2

What can be BEST defined as the examination of threat sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment?


Options are :

  • Risk analysis
  • Threat analysis
  • Risk management
  • Due diligence

Answer :Threat analysis

CISSP Security and Risk Management Certified Practice Exam Set 3

Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?


Options are :

  • Assessment
  • Validation
  • Verification
  • Accuracy

Answer :Verification

Which one of the following is NOT one of the outcomes of a vulnerability assessment?


Options are :

  • Quantative loss assessment
  • Formal approval of BCP scope and initiation document
  • Defining critical support areas
  • Qualitative loss assessment

Answer :Formal approval of BCP scope and initiation document

Which of the following is NOT a valid reason to use external penetration service firms rather than corporate resources?


Options are :

  • They are more cost-effective
  • They offer a lack of corporate bias
  • They use highly talented ex-hackers
  • They ensure a more complete reporting

Answer :They use highly talented ex-hackers

CISSP - Software Development Security Mock Questions

Common Criteria has assurance level from EAL 1 to EAL 7 regarding the depth of design and testing. Which of following assure the Target of Evaluation (or TOE) is methodically designed, tested and reviewed?


Options are :

  • EAL 4
  • EAL 3
  • EAL 5
  • EAL 6

Answer :EAL 4

When attempting to establish liability, which of the following would be described as performing the ongoing maintenance necessary to keep something in proper working order, updated, effective, or to abide by what is commonly expected in a situation?


Options are :

  • Due diligence
  • Due care
  • Due practice
  • Due concern

Answer :Due care

What is the essential difference between a self-audit and an independent audit?


Options are :

  • Competence
  • Tools used
  • Results
  • Objectivity

Answer :Objectivity

CISSP - Software Development Security Mock Questions

Which of the following testing method examines internal structure or working of an application?


Options are :

  • White-box testing
  • Parallel Tes
  • Pilot Testing
  • Regression Testing

Answer :White-box testing

Which of the following questions is LEAST likely to help in assessing controls covering audit trails?


Options are :

  • Is access to online logs strictly controlled?
  • Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?
  • Are incidents monitored and tracked until resolved?
  • Does the audit trail provide a trace of user actions?

Answer :Are incidents monitored and tracked until resolved?

A network-based vulnerability assessment is a type of test also referred to as:


Options are :

  • An active vulnerability assessment.
  • A host-based vulnerability assessment.
  • A routing vulnerability assessment.
  • A passive vulnerability assessment.

Answer :An active vulnerability assessment.

CISSP Security Assessment Testing Security Operations Exam Set 1

What IDS approach relies on a database of known attacks?


Options are :

  • Behavior-based intrusion detection
  • Network-based intrusion detection
  • Signature-based intrusion detection
  • Statistical anomaly-based intrusion detection

Answer :Signature-based intrusion detection

host-based IDS is resident on which of the following?


Options are :

  • bastion hosts
  • On each of the critical hosts
  • central hosts
  • decentralized hosts

Answer :On each of the critical hosts

Which of the following monitors network traffic in real time?


Options are :

  • network-based IDS
  • firewall-based IDS
  • host-based IDS
  • application-based IDS

Answer :network-based IDS

CISSP-ISSAP Information Systems Security Architecture Exam Set 3

Which of the following usually provides reliable, real-time information without consuming network or host resources?


Options are :

  • network-based IDS
  • firewall-based IDS
  • Verification
  • pplication-based IDS

Answer :network-based IDS

Which of the following reviews system and event logs to detect attacks on the host and determine if the attack was successful?


Options are :

  • host-based IDS
  • irewall-based IDS
  • bastion-based IDS
  • server-based IDS

Answer :host-based IDS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions