Nothing Special   »   [go: up one dir, main page]

300+ (UPDATED) CISSP MCQs and Answers (PDF)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

HOME Interview Questions MCQs Class Notes *LAB VIVA SEMINAR TOPICS

ONLINE TEST GATE CAT Internship ABOUT US

Any Skill Sear

Sign Up Free

Pass IT Certification Exams, World’s #1 Online

Exam-Labs

Home » Objective Questions » 300+ [UPDATED] CISSP MCQs


and Answers [PDF]

300+ [UPDATED] CISSP MCQs


and Answers [PDF]

Product Sourcing Made Easy

Alibaba.com

CISSP Objective Questions and Answers 


CISSP Objective Questions and Answers Pdf Download for
Exam CISSP Multiple choice Questions. Quiz CISSP Test
Questions

1. When an attacker sends unsolicited communication, it is


an example of:
A. Spoofing

B. Spamming

C. Crackers

D. Sniffers

Ans: B

Mcqs on CISSP

2. Masquerading is:
 

  A. Attempting to hack a system through backdoors to an


operating system or application

  B. Pretending to be an authorized user 

  C. Always done through IP spoofing

  D. Applying a subnet mask to an internal IP range

Ans: B

3. Integrity is protection of data from all of the following


EXCEPT: 
 

  A. Unauthorized changes

  B. Accidental changes

  C. Data analysis 

  D. Intentional manipulation

Ans: C

4. A security program cannot address which of the


following business goals?
 

  A. Accuracy of information 

  B. Change control

  C. User expectations

  D. Prevention of fraud

Ans: A

5. In most cases, integrity is enforced through:


 

  A. Physical security

  B. Logical security

  C. Confidentiality 
  D. Access controls 

Ans: D

6. A “well-formed transaction” is one that:


 

  A. Has all the necessary paperwork to substantiate the


transaction.

  B. Is based on clear business objectives.

  C. Ensures that data can be manipulated only by a specific set


of programs. 

  D. Is subject to duplicate processing.

Ans: C

7. In an accounting department, several people are


required to complete a financial process. This is most likely
an example of:
 

  A. Segregation of duties 

  B. Rotation of duties

  C. Need-to-know

  D. Collusion

Ans: A

 

8. Risk Management is commonly understood as all of the


following EXCEPT:
 

  A. Analyzing and assessing risk

  B. Identifying risk

  C. Accepting or mitigation of risk

  D. Likelihood of a risk occurring 

Ans: D

9. The percentage or degree of damage inflicted on an asset


used in the calculation of single loss expectancy can be
referred to as:
 

  A. Exposure Factor (EF) 

  B. Annualized Rate of Occurrence (ARO)

  C. Vulnerability

  D. Likelihood

Ans: A

10. The absence of a fire-suppression system would be best


characterized as a(n):
  
  A. Exposure

  B. Threat

  C. Vulnerability 

  D. Risk

Ans: C

11. Risk Assessment includes all of the following EXCEPT:


 

  A. Implementation of effective countermeasures 

  B. Ensuring that risk is managed

  C. Analysis of the current state of security in the target


environment

  D. Strategic analysis of risk

Ans: A

12. A risk management project may be subject to


overlooking certain types of threats. What can assist the
risk management team to prevent that?
 

  A. Automated tools 

  B. Adoption of qualitative risk assessment processes

  C. Increased reliance on internal experts for risk assessment 


  D. Recalculation of the work factor

Ans: A

13. Data classification can assist an organization in:


 

  A. Eliminating regulatory mandates

  B. Lowering accountability of data classifiers

  C. Reducing costs for protecting data 

  D. Normalization of databases

Ans: C

14. Who “owns” an organization’s data?


 

  A. Information technology group

  B. Users

  C. Data custodians

  D. Business units 

Ans: D

15. An information security policy does NOT usually


include: 
 

  A. Authority for information security department

  B. Guidelines for how to implement policy 

  C. Basis for data classification

  D. Recognition of information as an asset of the organization

Ans: B

16. The role of an information custodian should NOT


include:
 

  A. Restoration of lost or corrupted data

  B. Regular backups of data

  C. Establishing retention periods for data 

  D. Ensuring the availability of data

Ans: C

17. A main objective of awareness training is:


 

  A. Provide understanding of responsibilities 

  B. Entertaining the users through creative programs 


  C. Overcoming all resistance to security procedures

  D. To be repetitive to ensure accountability

Ans: A

18. What is a primary target of a person employing social


engineering?
 

  A. An individual 

  B. A policy

  C. Government agencies

  D. An information system

Ans: A

19. Social engineering can take many forms EXCEPT:


 

  A. Dumpster diving

  B. Coercion or intimidation

  C. Sympathy

  D. Eavesdropping 

Ans: D


20. Incident response planning can be instrumental in:
 

  A. Meeting regulatory requirements

  B. Creating customer loyalty

  C. Reducing the impact of an adverse event on the


organization 

  D. Ensuring management makes the correct decisions in a


crisis

Ans: C

21) A high profile company has been receiving a high


volume of attacks on their web site. The network
administrator wants to be able to collect information on
the attacker(s) so legal action can be taken. What should be
implemented?
 

  A. DMZ (Demilitarized Zone)

  B. A honey pot 

  C. A firewall

  D. A new subnet

Ans: B

22) You are running cabling for a network through a boiler


room where the furnace and some other heavy machinery 
reside. You are concerned about interference from these
sources. Which of the following types of cabling provides
the best protection from interference in this area?
 

  A. STP

  B. UTP

  C. Coaxial

  D. Fiber-optic 

Ans:  D

23) In order for a user to obtain a certificate from a trusted


CA Certificate Authority), the user must present proof of
identity and a?
  A. Private Key

  B. Public Key  

  C. Password

  D. Kerberos Key

Ans: B

24) while performing a routing site audit of your wireless


network, you discover an unauthorized Access Point
placed on your network under the desk of Accounting
department security. When questioned, she denies any 
knowledge of it, but informs you that her new boyfriend
has been to visit her several times, including taking her to
lunch one time. What type of attack have you just become a
victim of?
 

  A. Piggybacking

  B. Masquerading

  C. Man-in-da-middle attack

  D. Social Engineering  

Ans: D

25) when visiting an office adjacent to the server room,


you discover the lock to the window is broken. Because it is
not your office you tell the resident of the office to contact
the maintenance person and have it fixed. After leaving,
you fail to follow up on whether the windows were actually
repaired. What affect will this have on the likelihood of a
threat associated with the vulnerability actually
occurring? 
 

  A. If the window is repaired, the likelihood of the threat


occurring will increase. 

  B. If the window is repaired, the likelihood of the threat


occurring will remain constant.

  C. If the window is not repaired the, the likelihood of the threat


occurring will decrease.


  D. If the window is not repaired, the likelihood of the threat
occurring will increase.

Ans: A

26) a company consists of a main building with two


smaller branch offices at opposite ends of the city. The
main building and branch offices are connected with fast
links so that all employees have good connectivity to the
network. Each of the buildings has security measures that
require visitors to sign in, and all employees are required
to wear identification badges at all times. You want to
protect servers and other vital equipment so that the
company has the best level of security at the lowest
possible cost. Which of the following will you do to achieve
this objective?
  A. Centralize servers and other vital components in a single
room of the main building, and add security measures to this room so
that they are well protected. 

  B. Centralize most servers and other vital components in a


single room of the main building, and place servers at each of the
branch offices. Add security measures to areas where the servers and
other components are located.

  C. Decentralize servers and other vital components, and add


security measures to areas where the servers and other components
are located.

  D. main building. Because the building prevents unauthorized


access to visitors and other persons, there is no need to implement
physical security in the server room.

Ans: A 

27) You are explaining SSL to a junior administrator and


come up to the topic of handshaking. How many steps are
employed between the client and server in the SSL
handshake process?
  A. Five

  B. Six  

  C. Seven

  D. Eight

Ans: B

28) You have been alerted to the possibility of someone


using an application to capture and manipulate packets as
they are passing through your network. What type of threat
does this represent?
  A. DDos

  B. Trojan Horse

  C. Logic Bomb

  D. Man-in-the-middle 

Ans: D

29) A problem with air conditioning is causing


fluctuations in temperature in the server room. The
temperature is rising to 90 degrees when the air
conditioner stops working, and then drops to 60 degrees 
when it starts working again. The problem keeps occurring
over the next two days. What problem may result from
these fluctuations?
  A. Electrostatic discharge

  B. Power outages

  C. Chip creep 

  D. Poor air quality

Ans: C

30) While connected from home to an ISP (Internet


Service Provider), a network administrator performs a
port scan against a corporate server and encounters four
open TCP (Transmission Control Protocol) ports: 25, 110,
143 and 389. Corporate users in the organization must be
able to connect from home, send and receive messages on
the Internet, read e-mail by beams of the IMAPv.4
(Internet Message Access Protocol version 4) protocol, and
search into a directory services database for user e-mail
addresses, and digital certificates. All the e-mail relates
services, as well as the directory server, run on the scanned
server. Which of the above ports can be filtered out to
decrease unnecessary exposure without affecting
functionality?
  A. 25

  B. 110  

  C. 143

  D. 389

  Ans: B 
 

31) Asymmetric key cryptography is used for all of the


following except:
  A. Encryption of data

  B. Access control

  C. Nonrepudiation

  D. Steganography 

 Ans: D

32) The most common forms of asymmetric key


cryptography include
  A. Diffie–Hellman 

  B. Rijndael

  C. Blowfish

  D. SHA-256

 Ans: A

33) What is an important disadvantage of using a public


key algorithm compared to a symmetric algorithm?
  A. A symmetric algorithm provides better access control.

  B. A symmetric algorithm is a faster process. 

  C. A symmetric algorithm provides nonrepudiation of delivery.



  D. A symmetric algorithm is more difficult to implement.

Ans: B

34) When a user needs to provide message integrity, what


options may be best?
  A. Send a digital signature of the message to the recipient

  B. Encrypt the message with a symmetric algorithm and send


it

  C. Encrypt the message with a private key so the recipient can


decrypt with the corresponding public key

  D. Create a checksum, append it to the message, encrypt the


message, then send to recipient. 

Ans: D

35) A certificate authority provides what benefits to a user?


  A. Protection of public keys of all users

  B. History of symmetric keys

  C. Proof of nonrepudiation of origin

  D. Validation that a public key is associated with a particular


user 

Ans: D

36) What is the output length of a RIPEMD-160 hash? 


  A. 160 bits 

  B. 150 bits

  C. 128 bits

  D. 104 bits

 Ans:  A

37) ANSI X9.17 is concerned primarily with


  A. Protection and secrecy of keys 

  B. Financial records and retention of encrypted data

  C. Formalizing a key hierarchy

  D. The lifespan of key-encrypting keys (KKMs)

Ans: A

38) When a certificate is revoked, what is the proper


procedure?
  A. Setting new key expiry dates

  B. Updating the certificate revocation list 

  C. Removal of the private key from all directories

  D. Notification to all employees of revoked keys

 Ans: B


39) What is not true about link encryption?
  A. Link encryption encrypts routing information.

  B. Link encryption is often used for Frame Relay or satellite


links.

  C. Link encryption is suitable for high-risk environments. 

  D. Link encryption provides better traffic flow confidentiality.

Ans: C

40) A_________ is the sequence that controls the


operation of the cryptographic algorithm.
  A. Encoder

  B. Decoder wheel

  C. Cryptovariable 

  D. Cryptographic routine

 Ans:  C  

41) The process used in most block ciphers to increase


their strength is
  A. Diffusion

  B. Confusion

  C. Step function

  D. SP-network 

 Ans: D

42) The two methods of encrypting data are


  A. Substitution and transposition

  B. Block and stream

  C. Symmetric and asymmetric 

  D. DES and AES

Ans: C

43) Cryptography supports all of the core principles of


information security except
  A. Availability

  B. Confidentiality

  C. Integrity

  D. Authenticity 

Ans: D

44) A way to defeat frequency analysis as a method to


determine the key is to use
  A. Substitution ciphers

  B. Transposition ciphers

  C. Polyalphabetic ciphers  
  D. Inversion ciphers

Ans: C

45) The running key cipher is based on


  A. Modular arithmetic 

  B. XOR mathematics

  C. Factoring

  D. Exponentiation

Ans: A

46) The only cipher system said to be unbreakable by brute


force is
  A. AES

  B. DES

  C. One-time pad 

  D. Triple DES

 Ans: C

47) Messages protected by steganography can be


transmitted to
  A. Picture files

  B. Music files 
  C. Video files

  D. All of the above 

Ans: D

48) a significant action has a state that enables actions on


an ADP system to be traced to individuals who may then be
held responsible. The action does NOT include:
  A. Violations of security policy.

  B. Attempted violations of security policy.

  C. Non-violations of security policy.

  D. Attempted violations of allowed actions. 

Ans: D

49) Which of the following embodies all the detailed


actions that personnel are required to follow?
  A. Standards

  B. Guidelines

  C. Procedures 

  D. Baselines

Ans: C


50) which of the following choices is NOT part of a security
policy?
  A. definition of overall steps of information security and the
importance of security

  B. statement of management intend, supporting the goals and


principles of information security

  C. definition of general and specific responsibilities for


information security management

  D. .description of specific technologies used in the field of


information security 

Ans: D

---- >> Below Are The Related Posts Of Above


Questions :::

------>>[MOST IMPORTANT]<<------

1. 300+ TOP CISSP Objective Questions and Answers |


MCQs
2. 200+ TOP CISSP Online Quiz Questions – Exam Test |
Online Test
3. 300+ [UPDATED] SAP Security MCQs and Answers
[PDF]
4. 300+ TOP Radius Interview Questions [UPDATED]
5. 300+ TOP Palo Alto Firewall Interview Questions
[UPDATED]
6. 300+ TOP RSA Archer GRC Interview Questions
[UPDATED]
7. 250+ TOP MCQs on Information Security
Technologies and Answers
8. 250+ TOP MCQs on Network Management and
Answers 
9. 100+ TOP Computer Forensics Interview Questions |
Lab Viva
10. 300+ [UPDATED] System Administration Interview
Questions
11. 300+ TOP PRTG Interview Questions [UPDATED]
12. 300+ [LATEST] Information Security Analyst
Interview Questions and Answers
13. 250+ TOP MCQs on Transact SQL and Answers
14. 300+ [UPDATED] Active Directory MCQs and
Answers
15. 250+ TOP MCQs on Encryption and Its Applications
and Answers
16. 250+ TOP MCQs on Row Level Security and Answers
17. 300+ [UPDATED] WebLogic MCQs and Answers
[PDF]
18. 250+ TOP MCQs on Wireless Security and Answers
19. 250+ TOP MCQs on SNMP and Answers
20. 300+ [UPDATED] SQL Server Security Interview
Questions

LEAVE A REPLY

Your email address will not be published. Required fields are marked * 
Comment *

Name *

Email *

Website

Post Comment

Engineering 2022 , FAQs Interview Questions , Theme by Engineering||


Privacy Policy||
Terms and
Conditions||
ABOUT US||
Contact US||
Engineering interview questions,Mcqs,Objective Questions,Class Lecture Notes,Seminor topics,Lab
Viva Pdf PPT Doc Book free download. Most Asked Technical Basic CIVIL | Mechanical | CSE | EEE | ECE
| IT | Chemical | Medical MBBS Jobs Online Quiz Tests for Freshers Experienced .

You might also like