Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CISSP ISC Certified Information Systems Security Professional (CISSP) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC CISSP Certified Information Systems Security Professional (CISSP) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 7
Total 1486 questions

An organization has outsourced its financial transaction processing to a Cloud Service Provider (CSP) who will provide them with Software as a Service (SaaS). If there was a data breach who is responsible for monetary losses?

A.

The Data Protection Authority (DPA)

B.

The Cloud Service Provider (CSP)

C.

The application developers

D.

The data owner

What is the MAIN purpose of a change management policy?

A.

To assure management that changes to the Information Technology (IT) infrastructure are necessary

B.

To identify the changes that may be made to the Information Technology (IT) infrastructure

C.

To verify that changes to the Information Technology (IT) infrastructure are approved

D.

To determine the necessary for implementing modifications to the Information Technology (IT) infrastructure

When conducting a security assessment of access controls, which activity is part of the data analysis phase?

A.

Present solutions to address audit exceptions.

B.

Conduct statistical sampling of data transactions.

C.

Categorize and identify evidence gathered during the audit.

D.

Collect logs and reports.

An Information Technology (IT) professional attends a cybersecurity seminar on current incident response methodologies.

What code of ethics canon is being observed?

A.

Provide diligent and competent service to principals

B.

Protect society, the commonwealth, and the infrastructure

C.

Advance and protect the profession

D.

Act honorable, honesty, justly, responsibly, and legally

Which of the following is MOST appropriate for protecting confidentially of data stored on a hard drive?

A.

Triple Data Encryption Standard (3DES)

B.

Advanced Encryption Standard (AES)

C.

Message Digest 5 (MD5)

D.

Secure Hash Algorithm 2(SHA-2)

Which of the following is a direct monetary cost of a security incident?

A.

Morale

B.

Reputation

C.

Equipment

D.

Information

As part of an application penetration testing process, session hijacking can BEST be achieved by which of the following?

A.

Known-plaintext attack

B.

Denial of Service (DoS)

C.

Cookie manipulation

D.

Structured Query Language (SQL) injection

It is MOST important to perform which of the following to minimize potential impact when implementing a new vulnerability scanning tool in a production environment?

A.

Negotiate schedule with the Information Technology (IT) operation’s team

B.

Log vulnerability summary reports to a secured server

C.

Enable scanning during off-peak hours

D.

Establish access for Information Technology (IT) management

Which of the following mandates the amount and complexity of security controls applied to a security risk?

A.

Security vulnerabilities

B.

Risk tolerance

C.

Risk mitigation

D.

Security staff

A Security Operations Center (SOC) receives an incident response notification on a server with an active

intruder who has planted a backdoor. Initial notifications are sent and communications are established.

What MUST be considered or evaluated before performing the next step?

A.

Notifying law enforcement is crucial before hashing the contents of the server hard drive

B.

Identifying who executed the incident is more important than how the incident happened

C.

Removing the server from the network may prevent catching the intruder

D.

Copying the contents of the hard drive to another storage device may damage the evidence

Which security modes is MOST commonly used in a commercial environment because it protects the integrity

of financial and accounting data?

A.

Biba

B.

Graham-Denning

C.

Clark-Wilson

D.

Beil-LaPadula

What does electronic vaulting accomplish?

A.

It protects critical files.

B.

It ensures the fault tolerance of Redundant Array of Independent Disks (RAID) systems

C.

It stripes all database records

D.

It automates the Disaster Recovery Process (DRP)

Which of the following is the BEST reason for the use of security metrics?

A.

They ensure that the organization meets its security objectives.

B.

They provide an appropriate framework for Information Technology (IT) governance.

C.

They speed up the process of quantitative risk assessment.

D.

They quantify the effectiveness of security processes.

Which of the following is a common characteristic of privacy?

A.

Provision for maintaining an audit trail of access to the private data

B.

Notice to the subject of the existence of a database containing relevant credit card data

C.

Process for the subject to inspect and correct personal data on-site

D.

Database requirements for integration of privacy data

Who would be the BEST person to approve an organizations information security policy?

A.

Chief Information Officer (CIO)

B.

Chief Information Security Officer (CISO)

C.

Chief internal auditor

D.

Chief Executive Officer (CEO)

Which of the following MUST be in place to recognize a system attack?

A.

Stateful firewall

B.

Distributed antivirus

C.

Log analysis

D.

Passive honeypot

Which of the following are important criteria when designing procedures and acceptance criteria for acquired software?

A.

Code quality, security, and origin

B.

Architecture, hardware, and firmware

C.

Data quality, provenance, and scaling

D.

Distributed, agile, and bench testing

A chemical plan wants to upgrade the Industrial Control System (ICS) to transmit data using Ethernet instead of RS422. The project manager wants to simplify administration and maintenance by utilizing the office network infrastructure and staff to implement this upgrade.

Which of the following is the GREATEST impact on security for the network?

A.

The network administrators have no knowledge of ICS

B.

The ICS is now accessible from the office network

C.

The ICS does not support the office password policy

D.

RS422 is more reliable than Ethernet

Which of the following is a responsibility of the information owner?

A.

Ensure that users and personnel complete the required security training to access the Information System

(IS)

B.

Defining proper access to the Information System (IS), including privileges or access rights

C.

Managing identification, implementation, and assessment of common security controls

D.

Ensuring the Information System (IS) is operated according to agreed upon security requirements

What is the process of removing sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique?

A.

Purging

B.

Encryption

C.

Destruction

D.

Clearing

In which of the following programs is it MOST important to include the collection of security process data?

A.

Quarterly access reviews

B.

Security continuous monitoring

C.

Business continuity testing

D.

Annual security training

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?

A.

Host VM monitor audit logs

B.

Guest OS access controls

C.

Host VM access controls

D.

Guest OS audit logs

Which of the following could cause a Denial of Service (DoS) against an authentication system?

A.

Encryption of audit logs

B.

No archiving of audit logs

C.

Hashing of audit logs

D.

Remote access audit logs

Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?

A.

Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be taken

B.

Technical teams will understand the testing objectives, testing strategies applied, and business risk associated with each vulnerability

C.

Management teams will understand the testing objectives and reputational risk to the organization

D.

Technical and management teams will better understand the testing objectives, results of each test phase, and potential impact levels

Which of the following is of GREATEST assistance to auditors when reviewing system configurations?

A.

Change management processes

B.

User administration procedures

C.

Operating System (OS) baselines

D.

System backup documentation

In the Open System Interconnection (OSI) model, which layer is responsible for the transmission of binary data over a communications network?

A.

Application Layer

B.

Physical Layer

C.

Data-Link Layer

D.

Network Layer

Which of the following is the PRIMARY concern when using an Internet browser to access a cloud-based service?

A.

Insecure implementation of Application Programming Interfaces (API)

B.

Improper use and storage of management keys

C.

Misconfiguration of infrastructure allowing for unauthorized access

D.

Vulnerabilities within protocols that can expose confidential data

For an organization considering two-factor authentication for secure network access, which of the following is MOST secure?

A.

Challenge response and private key

B.

Digital certificates and Single Sign-On (SSO)

C.

Tokens and passphrase

D.

Smart card and biometrics

Which technology is a prerequisite for populating the cloud-based directory in a federated identity solution?

A.

Notification tool

B.

Message queuing tool

C.

Security token tool

D.

Synchronization tool

Which of the following activities BEST identifies operational problems, security misconfigurations, and malicious attacks?

A.

Policy documentation review

B.

Authentication validation

C.

Periodic log reviews

D.

Interface testing

Page: 5 / 7
Total 1486 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved