Exam Code: CISSP (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Information Systems Security Professional (CISSP)
Certification Provider: ISC2
Free Today! Guaranteed Training- Pass CISSP Exam.

2021 Dec CISSP practice test

Q131. What should happen when an emergency change to.a system.must be performed? 

A. The change must be given priority at the next meeting of the change control board. 

B. Testing and approvals must be performed quickly. 

C. The change must be performed immediately and then submitted to the change board. 

D. The change is performed and a notation is made in the system log. 

Answer:


Q132. Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver? 

A. Physical 

B. Session 

C. Transport 

D. Data-Link 

Answer:


Q133. What component of a web application that stores the session state in a cookie can be bypassed by an attacker? 

A. An initialization check 

B. An identification check 

C. An authentication check 

D. An authorization check 

Answer:


Q134. Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen? 

A. Set up a BIOS and operating system password 

B. Encrypt the virtual drive where confidential files can be stored 

C. Implement a mandatory policy in which sensitive data cannot be stored on laptops, but only on the corporate network 

D. Encrypt the entire disk and delete contents after a set number of failed access attempts 

Answer:


Q135. Why must all users be positively identified.prior.to using multi-user computers? 

A. To provide access to system privileges 

B. To provide access to the operating system 

C. To ensure that unauthorized persons cannot access the computers 

D. To ensure that management knows what users are currently logged on 

Answer:


Renewal CISSP exam cram:

Q136. The MAIN reason an organization conducts a security authorization process is to 

A. force the organization to make conscious risk decisions. 

B. assure the effectiveness of security controls. 

C. assure the correct security organization exists. 

D. force the organization to enlist management support. 

Answer:


Q137. DRAG DROP 

Order the below steps to create an effective vulnerability management process. 

Answer: 


Q138. Which of the following is an example of two-factor authentication? 

A. Retina scan.and a palm print 

B. Fingerprint and a smart card 

C. Magnetic stripe card and an ID badge 

D. Password and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 

Answer:


Q139. Passive Infrared Sensors (PIR) used in a non-climate controlled environment should 

A. reduce the detected object temperature in relation to the background temperature. 

B. increase the detected object temperature in relation to the background temperature. 

C. automatically compensate for variance in background temperature. 

D. detect objects of a specific temperature independent of the background temperature. 

Answer:


Q140. Which of the following BEST describes a rogue Access Point (AP)? 

A. An AP that is not protected by a firewall 

B. An.AP not configured to use Wired Equivalent Privacy (WEP) with Triple Data Encryption Algorithm (3DES) 

C. An.AP connected to the wired infrastructure but not under the management of authorized network administrators 

D. An.AP infected by any kind of Trojan or Malware 

Answer: