Free Certification Practice Questions

ISC-CISSP

Loading…
Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?
#1
Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?
#2
Which of the following are examples of physical controls used to prevent unauthorized access to sensitive materials?
#3
Which of the following security issues does the Bell-La Padula model focus on?
#4
Which of the following are the examples of administrative controls? Each correct answer represents a complete solution. Choose all that apply.
#5
Which of the following processes provides a standard set of activities, general tasks, and a management structure to certify and accredit systems, which maintain the information assurance and the security posture of a system or site?
#6
Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?
#7
Which of the following are the ways of sending secure e-mail messages over the Internet? Each correct answer represents a complete solution. Choose two.
#8
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?
#9
Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other types of malicious code that causes harm to the computer systems?
#10
Which of the following is the best method to stop vulnerability attacks on a Web server?
#11
What course of action can be taken by a party if the current negotiations fail and an agreement cannot be reached?
#12
Which of the following is NOT a valid maturity level of the Software Capability Maturity Model (CMM)?
#13
Which of the following statements is related with the second law of OPSEC?
#14
Which of the following elements of BCP process includes the areas of plan implementation, plan testing, and ongoing plan maintenance, and also involves defining and documenting the continuity strategy?
#15
Which of the following types of evidence is considered as the best evidence?
#16
What are the purposes of audit records on an information system? Each correct answer represents a complete solution. Choose two.
#17
Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?
#18
Which of the following analysis provides a foundation for measuring investment of time, money and human resources required to achieve a particular outcome?
#19
Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?
#20
Which of the following laws enacted in United States makes it illegal for an Internet Service Provider (ISP) to allow child pornography to exist on Web sites?
#21
You work as a Web Administrator for Perfect World Inc. The company is planning to host an E-commerce Web site. You are required to design a security plan for it. Client computers with different operating systems will access the Web server. How will you configure the Web server so that it is secure and only authenticated users are able to access it? Each correct answer represents a part of the solution. Choose two.
#22
Which of the following characteristics are described by the DIAP Information Readiness Assessment function? Each correct answer represents a complete solution. Choose all that apply.
#23
Your project has several risks that may cause serious financial impact should they happen. You have studied the risk events and made some potential risk responses for the risk events but management wants you to do more. They'd like for you to create some type of a chart that identified the risk probability and impact with a financial amount for each risk event. What is the likely outcome of creating this type of chart?
#24
Joseph works as a Software Developer for Web Tech Inc. He wants to protect the algorithms and the techniques of programming that he uses in developing an application. Which of the following laws are used to protect a part of software?
#25
Which of the following is used to authenticate asymmetric keys?
#26
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The company has two offices in different cities. The company wants to connect the two offices by using a public network. You decide to configure a virtual private network (VPN) between the offices. Which of the following protocols is used by VPN for tunneling?
#27
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?
#28
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?
#29
You work as a Chief Security Officer for Tech Perfect Inc. You have configured IPSec and ISAKMP protocol in the company's network in order to establish a secure communication infrastructure. ccording to the Internet RFC 2408, which of the following services does the ISAKMP protocol offer to the network? Each correct answer represents a part of the solution. Choose all that apply.
#30