ISC CISSP Certified Information Systems Security Professional Online Training
ISC CISSP Online Training
The questions for CISSP were last updated at May 07,2025.
- Exam Code: CISSP
- Exam Name: Certified Information Systems Security Professional
- Certification Provider: ISC
- Latest update: May 07,2025
Which of the following could cause a Denial of Service (DoS) against an authentication system?
- A . Encryption of audit logs
- B . No archiving of audit logs
- C . Hashing of audit logs
- D . Remote access audit logs
A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation .
What MUST an administrator review to audit a user’s access to data files?
- A . Host VM monitor audit logs
- B . Guest OS access controls
- C . Host VM access controls
- D . Guest OS audit logs
With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?
- A . Continuously without exception for all security controls
- B . Before and after each change of the control
- C . At a rate concurrent with the volatility of the security control
- D . Only during system implementation and decommissioning
What is the MOST important step during forensic analysis when trying to learn the purpose of an unknown application?
- A . Disable all unnecessary services
- B . Ensure chain of custody
- C . Prepare another backup of the system
- D . Isolate the system from the network
A continuous information security monitoring program can BEST reduce risk through which of the following?
- A . Collecting security events and correlating them to identify anomalies
- B . Facilitating system-wide visibility into the activities of critical user accounts
- C . Encompassing people, process, and technology
- D . Logging both scheduled and unscheduled system changes
What would be the MOST cost effective solution for a Disaster Recovery (DR) site given that the organization’s systems cannot be unavailable for more than 24 hours?
- A . Warm site
- B . Hot site
- C . Mirror site
- D . Cold site
An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit .
What would be the MOST probable cause?
- A . Absence of a Business Intelligence (BI) solution
- B . Inadequate cost modeling
- C . Improper deployment of the Service-Oriented Architecture (SOA)
- D . Insufficient Service Level Agreement (SLA)
Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?
- A . Hardware and software compatibility issues
- B . Applications’ critically and downtime tolerance
- C . Budget constraints and requirements
- D . Cost/benefit analysis and business objectives
When is a Business Continuity Plan (BCP) considered to be valid?
- A . When it has been validated by the Business Continuity (BC) manager
- B . When it has been validated by the board of directors
- C . When it has been validated by all threat scenarios
- D . When it has been validated by realistic exercises
Which of the following is the FIRST step in the incident response process?
- A . Determine the cause of the incident
- B . Disconnect the system involved from the network
- C . Isolate and contain the system involved
- D . Investigate all symptoms to confirm the incident