Proper study guides for Up to date ISC2 Certified Information Systems Security Professional (CISSP) certified begins with ISC2 CISSP preparation products which designed to deliver the Precise CISSP questions by making you pass the CISSP test at your first time. Try the free CISSP demo right now.

2021 Nov CISSP practice question

Q171. The BEST method of demonstrating a company's security level to potential customers is 

A. a report from an external auditor. 

B. responding to a customer's security questionnaire. 

C. a formal report from an internal auditor. 

D. a site visit by a customer's security team. 

Answer:


Q172. If compromised, which of the following would lead to the exploitation of multiple virtual machines? 

A. Virtual device drivers 

B. Virtual machine monitor 

C. Virtual machine instance 

D. Virtual machine file system 

Answer:


Q173. Which of the following is the PRIMARY benefit of implementing.data-in-use controls? 

A. If the data is lost, it must be decrypted to be opened. 

B. If the data is lost, it will not be accessible to unauthorized users. 

C. When the data is being viewed, it can only be printed by.authorized users. 

D. When the data is being viewed, it must be accessed using secure protocols. 

Answer:


Q174. Which of the following is a process within a Systems Engineering Life Cycle (SELC) stage? 

A. Requirements Analysis 

B. Development and Deployment 

C. Production Operations 

D. Utilization Support 

Answer:


Q175. An auditor carrying out a compliance audit requests passwords that are encrypted in the system to verify that the passwords are compliant with policy. Which of the following is the BEST response to the auditor? 

A. Provide the encrypted passwords and analysis tools to the auditor for analysis. 

B. Analyze the encrypted passwords for the auditor and show them the results. 

C. Demonstrate that non-compliant passwords cannot be created in the system. 

D. Demonstrate that non-compliant passwords cannot be encrypted in the system. 

Answer:


Renovate CISSP free practice exam:

Q176. What is the MAIN feature that onion routing networks offer? 

A. Non-repudiation 

B. Traceability 

C. Anonymity 

D. Resilience 

Answer:


Q177. What is the MOST effective method for gaining unauthorized access to a file protected with a long complex password? 

A. Brute force attack 

B. Frequency analysis 

C. Social engineering 

D. Dictionary attack 

Answer:


Q178. An online retail company has formulated a record retention schedule for customer transactions. Which of the following is a valid.reason a customer transaction is kept beyond the retention schedule? 

A. Pending legal hold 

B. Long term data mining needs 

C. Customer makes request to retain 

D. Useful for future business initiatives 

Answer:


Q179. What do Capability Maturity Models (CMM) serve as a benchmark for in an organization? 

A. Experience in the industry 

B. Definition of security profiles 

C. Human resource planning efforts 

D. Procedures in systems development 

Answer:


Q180. Which of the following is the MAIN goal of a data retention policy? 

A. Ensure.that data is destroyed properly. 

B. Ensure that data recovery can be done on the data. 

C. Ensure the integrity and availability of data for a predetermined amount of time. 

D. Ensure.the integrity and confidentiality of data for a predetermined amount of time. 

Answer: