ISC2 Certified Information Systems Security Professional CISSP Exam Practice Test

Page: 1 / 14
Total 1486 questions
Question 1

An organization has doubled in size due to a rapid market share increase. The size of the Information Technology (IT) staff has maintained pace with this growth. The organization hires several contractors whose onsite time is limited. The IT department has pushed its limits building servers and rolling out workstations and has a backlog of account management requests.

Which contract is BEST in offloading the task from the IT staff?



Answer : B

Identity as a Service (IDaaS) is the best contract in offloading the task of account management from the IT staff. IDaaS is a cloud-based service that provides identity and access management (IAM) functions, such as user authentication, authorization, provisioning, deprovisioning, password management, single sign-on (SSO), and multifactor authentication (MFA). IDaaS can help the organization to streamline and automate the account management process, reduce the workload and costs of the IT staff, and improve the security and compliance of the user accounts. IDaaS can also support the contractors who have limited onsite time, as they can access the organization's resources remotely and securely through the IDaaS provider.

The other options are not as effective as IDaaS in offloading the task of account management from the IT staff, as they do not provide IAM functions. Platform as a Service (PaaS) is a cloud-based service that provides a platform for developing, testing, and deploying applications, but it does not manage the user accounts for the applications. Desktop as a Service (DaaS) is a cloud-based service that provides virtual desktops for users to access applications and data, but it does not manage the user accounts for the virtual desktops. Software as a Service (SaaS) is a cloud-based service that provides software applications for users to use, but it does not manage the user accounts for the software applications.


Question 2

An information technology (IT) employee who travels frequently to various ies remotely to an organization'

the following solutions BEST serves as a secure control mechanism to meet the organization's requirements?

to troubleshoot p Which of the following solutions BEST serves as a secure control mechanisn to meet the organization's requirements?



Answer : D

A bastion host is a hardened server that is placed in the demilitarized zone (DMZ), a network segment that is exposed to the internet and separated from the internal network by firewalls. A bastion host provides a secure and controlled access point for remote users or administrators who need to connect to the internal network or systems. A bastion host can also act as a proxy server, a VPN gateway, or a jump server, depending on the configuration and the purpose. A bastion host should be protected by multiple layers of security, such as multi-factor authentication (MFA), encryption, logging, monitoring, and patching. A bastion host is the best solution to allow an IT employee who travels frequently to various locations to troubleshoot problems remotely, as it minimizes the exposure and the risk of unauthorized access. The other options are not as secure or feasible as a bastion host. Updating the firewall rules to include the static IP addresses of the locations where the employee connects from is not a good practice, as it creates unnecessary firewall rules and it assumes that the employee always connects from the same locations. Installing a third-party screen sharing solution that provides remote connection from a public website is not a secure option, as it relies on an external service that may not be trustworthy or compliant with the organization's policies. Implementing a Dynamic Domain Name Services (DDNS) account to initiate a VPN using the DDNS record is not a practical option, as it requires the employee to have a dynamic IP address and a DDNS client on their device, and it may not work with some firewalls or routers that block DDNS traffic.Reference:CISSP All-in-One Exam Guide, Eighth Edition, Chapter 5: Communication and Network Security, page 597.Official (ISC)2 CISSP CBK Reference, Fifth Edition, Chapter 5: Communication and Network Security, page 598.


Question 3

An organization implements a Remote Access Server (RAS). Once users correct to the server, digital certificates are used to authenticate their identity. What type of Extensible Authentication Protocol (EAP) would the organization use dring this authentication?



Answer : A

Transport layer security (TLS) is a type of Extensible Authentication Protocol (EAP) that the organization would use during this authentication. EAP is a framework that supports various methods of authentication for network access. TLS is one of the EAP methods that uses digital certificates to authenticate both the client and the server, and to establish a secure session key for encryption. TLS provides strong security, mutual authentication, and resistance to replay attacks. Reference: CISSP All-in-One Exam Guide, Eighth Edition, Chapter 4: Communication and Network Security, page 189; [Official (ISC)2 CISSP CBK Reference, Fifth Edition, Chapter 4: Communication and Network Security, page 263]


Question 4

Which of the following goals represents a modern shift in risk management according to National Institute of Standards and Technology (NIST)?



Question 5

The security team has been tasked with performing an interface test against a frontend external facing application and needs to verify that all input fields protect against

invalid input. Which of the following BEST assists this process?



Answer : A

The technique that can be used to verify that all input fields protect against invalid input is application fuzzing. Application fuzzing is a technique that involves the generation, injection, or submission of random, malformed, or unexpected data or input, to an application, system, or resource, to test or evaluate the behavior, response, or output, of the application, system, or resource, to the data or input, as well as to identify or detect any errors, bugs, or vulnerabilities, that may exist or occur in the application, system, or resource, due to the data or input. Application fuzzing can be used to verify that all input fields protect against invalid input, by providing various types or formats of data or input, such as strings, numbers, symbols, or commands, to the input fields of the application, system, or resource, and by observing or analyzing the results or effects of the data or input, such as crashes, exceptions, or anomalies, on the application, system, or resource. Application fuzzing can help to ensure the functionality, performance, or security of the application, system, or resource, by discovering, testing, or validating the input validation, sanitization, or filtering mechanisms or functions, that are implemented or applied to the application, system, or resource, to prevent, mitigate, or handle the invalid input. Instruction set simulation, regression testing, or sanity testing are not the techniques that can be used to verify that all input fields protect against invalid input, as they are either more related to the methods, techniques, or tools, that are used to emulate, verify, or check the functionality, performance, or compatibility of the application, system, or resource, rather than to test or evaluate the behavior, response, or output of the application, system, or resource, to the random, malformed, or unexpected data or input.Reference:CISSP All-in-One Exam Guide, Eighth Edition, Chapter 8: Software Development Security, page 552;CISSP Official (ISC)2 Practice Tests, Third Edition, Domain 8: Software Development Security, Question 8.14, page 306.


Question 6
Question 7
Page:    1 / 14   
Total 1486 questions