ISC CISSP Certified Information Systems Security Professional Online Training
ISC CISSP Online Training
The questions for CISSP were last updated at May 12,2025.
- Exam Code: CISSP
- Exam Name: Certified Information Systems Security Professional
- Certification Provider: ISC
- Latest update: May 12,2025
A disadvantage of an application filtering firewall is that it can lead to
- A . a crash of the network as a result of user activities.
- B . performance degradation due to the rules applied.
- C . loss of packets on the network due to insufficient bandwidth.
- D . Internet Protocol (IP) spoofing by hackers.
Passive Infrared Sensors (PIR) used in a non-climate controlled environment should
- A . reduce the detected object temperature in relation to the background temperature.
- B . increase the detected object temperature in relation to the background temperature.
- C . automatically compensate for variance in background temperature.
- D . detect objects of a specific temperature independent of the background temperature.
Logical access control programs are MOST effective when they are
- A . approved by external auditors.
- B . combined with security token technology.
- C . maintained by computer security officers.
- D . made part of the operating system.
Checking routing information on e-mail to determine it is in a valid format and contains valid information is an example of which of the following anti-spam approaches?
- A . Simple Mail Transfer Protocol (SMTP) blacklist
- B . Reverse Domain Name System (DNS) lookup
- C . Hashing algorithm
- D . Header analysis
In the area of disaster planning and recovery, what strategy entails the presentation of information about the plan?
- A . Communication
- B . Planning
- C . Recovery
- D . Escalation
What is the MOST important purpose of testing the Disaster Recovery Plan (DRP)?
- A . Evaluating the efficiency of the plan
- B . Identifying the benchmark required for restoration
- C . Validating the effectiveness of the plan
- D . Determining the Recovery Time Objective (RTO)
Which layer of the Open Systems Interconnections (OSI) model implementation adds information concerning the logical connection between the sender and receiver?
- A . Physical
- B . Session
- C . Transport
- D . Data-Link
The goal of software assurance in application development is to
- A . enable the development of High Availability (HA) systems.
- B . facilitate the creation of Trusted Computing Base (TCB) systems.
- C . prevent the creation of vulnerable applications.
- D . encourage the development of open source applications.
The three PRIMARY requirements for a penetration test are
- A . A defined goal, limited time period, and approval of management
- B . A general objective, unlimited time, and approval of the network administrator
- C . An objective statement, disclosed methodology, and fixed cost
- D . A stated objective, liability waiver, and disclosed methodology
Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?
- A . Cross Origin Resource Sharing (CORS)
- B . WebSockets
- C . Document Object Model (DOM) trees
- D . Web Interface Definition Language (IDL)