ISC2 CISSP Certified Information Systems Security Professional Exam Practice Test

Page: 1 / 14
Total 1486 questions
Question 1

In setting expectations when reviewing the results of a security test, which of the following statements is MOST important to convey to reviewers?



Answer : B

The most important statement to convey to reviewers when setting expectations for reviewing the results of a security test is that the results of the tests represent a point-in-time assessment of the target(s). A security test is a process of evaluating and measuring the security posture and performance of an information system or a network, by using various tools, techniques, and methods, such as vulnerability scanning, penetration testing, or security auditing. The results of a security test reflect the security state of the target(s) at the time of the test, and they may not be valid or accurate for a different time period, as the security environment and conditions may change due to various factors, such as new threats, patches, updates, or configurations. Therefore, reviewers should understand that the results of a security test are not definitive or permanent, but rather indicative or temporary, and that they should be interpreted and used accordingly. The statement that the target's security posture cannot be further compromised is not true, as a security test does not guarantee or ensure the security of the target(s), but rather identifies and reports the security issues or weaknesses that may exist. The statement that the accuracy of testing results can be greatly improved if the target(s) are properly hardened is not relevant, as a security test is not meant to improve the accuracy of the results, but rather to assess the security of the target(s), and hardening the target(s) before the test may not reflect the actual or realistic security posture of the target(s). The statement that the deficiencies identified can be corrected immediately is not realistic, as a security test may identify various types of deficiencies that may require different levels of effort, time, and resources to correct, and some deficiencies may not be correctable at all, due to technical, operational, or financial constraints.


Question 2

Compared to a traditional network, which of the following is a security-related benefit that software-defined networking (SDN) provides?



Answer : B

Software-defined networking (SDN) is a network architecture that decouples the control plane from the data plane, enabling centralized network management and programmability. Compared to a traditional network, one of the security-related benefits that SDN provides is centralized network administrator control. This means that the network administrator can monitor, configure, and secure the entire network from a single point of authority, using software applications and policies. This reduces the complexity, inconsistency, and vulnerability of the network, as well as the human errors and misconfigurations. Centralized network provisioning is not a security-related benefit, but rather an operational benefit of SDN. It means that the network administrator can provision and deploy network resources and services faster and easier, using software commands and automation. Reduced network latency when scaled is not a security-related benefit, but rather a performance benefit of SDN. It means that the network can handle more traffic and data without compromising the speed and quality of service, using software optimization and load balancing. Reduced hardware footprint and cost is not a security-related benefit, but rather an economic benefit of SDN. It means that the network can use less physical devices and components, such as routers and switches, and rely more on software functions and virtualization.Reference:CISSP All-in-One Exam Guide, Eighth Edition, Chapter 4: Communication and Network Security, p. 254-255.Official (ISC)2 CISSP CBK Reference, Fifth Edition, Domain 4: Communication and Network Security, p. 406-407.


Question 3

Which of the following describes the order in which a digital forensic process is usually conducted?



Question 4

An organization is preparing to achieve General Data Protection Regulation (GDPR) compliance. The Chief Information Security Officer (CISO) is reviewing data protection methods.

Which of the following is the BEST data protection method?



Answer : A

Encryption is the process of transforming data into an unreadable format using a secret key or algorithm. Encryption ensures the confidentiality, integrity, and availability of the data, and protects it from unauthorized access, modification, or deletion. Encryption is also a requirement of the GDPR, which is a legal framework that sets guidelines for the collection and processing of personal data of individuals within the EU.


Question 5

The MAIN purpose of placing a tamper seal on a computer system's case is to:



Question 6

Which Open Systems Interconnection (OSI) layer(s) BEST corresponds to the network access layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model?



Answer : B

The OSI layer(s) that best corresponds to the network access layer in the TCP/IP model is the Data Link and Physical Layers. The network access layer in the TCP/IP model is the lowest layer that provides the functions and the mechanisms for accessing and transmitting the data or the information over the physical network or the medium, such as the cable, the wireless, or the optical fiber. The network access layer in the TCP/IP model corresponds to the Data Link and Physical Layers in the OSI model, because they provide similar functions and mechanisms for accessing and transmitting the data or the information over the physical network or the medium, such as:

The Physical Layer in the OSI model defines and describes the physical characteristics and the specifications of the network or the medium, such as the voltage, the frequency, the modulation, or the connector, and it converts and transmits the data or the information into the electrical, optical, or radio signals, and vice versa.

The Data Link Layer in the OSI model defines and describes the logical characteristics and the specifications of the network or the medium, such as the addressing, the framing, the error detection, or the flow control, and it establishes and maintains the link or the connection between the systems or the devices, and it transfers and receives the data or the information in the form of the frames or the packets.

The other options are not the OSI layer(s) that best corresponds to the network access layer in the TCP/IP model. The Transport Layer in the OSI model defines and describes the functions and the mechanisms for ensuring the reliable and the efficient delivery and the transmission of the data or the information between the systems or the devices, such as the segmentation, the reassembly, the acknowledgment, or the retransmission, and it corresponds to the Transport Layer in the TCP/IP model. The Application, Presentation, and Session Layers in the OSI model define and describe the functions and the mechanisms for providing the services and the interfaces for the applications or the programs that use the network or the medium, such as the encryption, the compression, the translation, or the synchronization, and they correspond to the Application Layer in the TCP/IP model. The Session and Network Layers in the OSI model define and describe the functions and the mechanisms for establishing and managing the communication and the connection between the systems or the devices, such as the session, the dialogue, the routing, or the addressing, and they correspond to the Internet Layer in the TCP/IP model.Reference:CISSP All-in-One Exam Guide, Eighth Edition, Chapter 5: Communication and Network Security, page 535.Official (ISC)2 CISSP CBK Reference, Fifth Edition, Chapter 5: Communication and Network Security, page 536.


Question 7

An organization is planning to have an it audit of its as a Service (SaaS) application to demonstrate to external parties that the security controls around availability are designed. The audit report must also cover a certain period of time to show the operational effectiveness of the controls. Which Service Organization Control (SOC) report would BEST fit their needs?



Answer : D

A SOC 2 Type 2 report would best fit the needs of the organization that wants to have an IT audit of its SaaS application to demonstrate the security controls around availability. A SOC 2 Type 2 report provides information about the design and the operating effectiveness of the controls at a service organization relevant to the availability trust service category, as well as the other trust service categories such as security, processing integrity, confidentiality, and privacy. A SOC 2 Type 2 report covers a specified period of time, usually between six and twelve months, and includes the description of the tests of controls and the results performed by the auditor. A SOC 2 Type 2 report is intended for the general or the restricted use of the user entities and the other interested parties that need to understand the security controls of the service organization.

The other options are not the best fit for the needs of the organization. A SOC 1 report is for organizations whose internal security controls can impact a customer's financial statements, and it is based on the SSAE 18 standard. A SOC 1 report does not cover the availability trust service category, but rather the control objectives defined by the service organization. A SOC 1 report can be either Type 1 or Type 2, depending on whether it evaluates the design of the controls at a point in time or the operating effectiveness of the controls over a period of time. A SOC 1 report is intended for the restricted use of the user entities and the other interested parties that need to understand the internal control over financial reporting of the service organization. A SOC 2 Type 1 report is similar to a SOC 2 Type 2 report, except that it evaluates the design of the controls at a point in time, and does not include the tests of controls and the results. A SOC 2 Type 1 report may not provide sufficient assurance about the operational effectiveness of the controls over a period of time. A SOC 3 report is a short form, general use report that gives users and interested parties a report about controls at a service organization related to the trust service categories. A SOC 3 report does not include the description of tests of controls and results, which limits its usability and detail.


Page:    1 / 14   
Total 1486 questions