300+ (UPDATED) CISSP MCQs and Answers (PDF)
300+ (UPDATED) CISSP MCQs and Answers (PDF)
300+ (UPDATED) CISSP MCQs and Answers (PDF)
Sign Up Free
Exam-Labs
Alibaba.com
B. Spamming
C. Crackers
D. Sniffers
Ans: B
Mcqs on CISSP
2. Masquerading is:
Ans: B
A. Unauthorized changes
B. Accidental changes
C. Data analysis
D. Intentional manipulation
Ans: C
A. Accuracy of information
B. Change control
C. User expectations
D. Prevention of fraud
Ans: A
A. Physical security
B. Logical security
C. Confidentiality
D. Access controls
Ans: D
Ans: C
A. Segregation of duties
B. Rotation of duties
C. Need-to-know
D. Collusion
Ans: A
B. Identifying risk
Ans: D
C. Vulnerability
D. Likelihood
Ans: A
B. Threat
C. Vulnerability
D. Risk
Ans: C
Ans: A
A. Automated tools
Ans: A
D. Normalization of databases
Ans: C
B. Users
C. Data custodians
D. Business units
Ans: D
Ans: B
Ans: C
Ans: A
A. An individual
B. A policy
C. Government agencies
D. An information system
Ans: A
A. Dumpster diving
B. Coercion or intimidation
C. Sympathy
D. Eavesdropping
Ans: D
20. Incident response planning can be instrumental in:
Ans: C
B. A honey pot
C. A firewall
D. A new subnet
Ans: B
A. STP
B. UTP
C. Coaxial
D. Fiber-optic
Ans: D
B. Public Key
C. Password
D. Kerberos Key
Ans: B
A. Piggybacking
B. Masquerading
C. Man-in-da-middle attack
D. Social Engineering
Ans: D
D. If the window is not repaired, the likelihood of the threat
occurring will increase.
Ans: A
Ans: A
B. Six
C. Seven
D. Eight
Ans: B
B. Trojan Horse
C. Logic Bomb
D. Man-in-the-middle
Ans: D
B. Power outages
C. Chip creep
Ans: C
B. 110
C. 143
D. 389
Ans: B
B. Access control
C. Nonrepudiation
D. Steganography
Ans: D
B. Rijndael
C. Blowfish
D. SHA-256
Ans: A
Ans: B
Ans: D
Ans: D
B. 150 bits
C. 128 bits
D. 104 bits
Ans: A
Ans: A
Ans: B
39) What is not true about link encryption?
A. Link encryption encrypts routing information.
Ans: C
B. Decoder wheel
C. Cryptovariable
D. Cryptographic routine
Ans: C
B. Confusion
C. Step function
D. SP-network
Ans: D
Ans: C
B. Confidentiality
C. Integrity
D. Authenticity
Ans: D
B. Transposition ciphers
C. Polyalphabetic ciphers
D. Inversion ciphers
Ans: C
B. XOR mathematics
C. Factoring
D. Exponentiation
Ans: A
B. DES
C. One-time pad
D. Triple DES
Ans: C
B. Music files
C. Video files
Ans: D
Ans: D
B. Guidelines
C. Procedures
D. Baselines
Ans: C
50) which of the following choices is NOT part of a security
policy?
A. definition of overall steps of information security and the
importance of security
Ans: D
------>>[MOST IMPORTANT]<<------
LEAVE A REPLY
Your email address will not be published. Required fields are marked *
Comment *
Name *
Email *
Website
Post Comment