ISC CISSP Certified Information Systems Security Professional Online Training
ISC CISSP Online Training
The questions for CISSP were last updated at May 09,2025.
- Exam Code: CISSP
- Exam Name: Certified Information Systems Security Professional
- Certification Provider: ISC
- Latest update: May 09,2025
Which of the following types of business continuity tests includes assessment of resilience to internal and external risks without endangering live operations?
- A . Walkthrough
- B . Simulation
- C . Parallel
- D . White box
A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?
- A . Guaranteed recovery of all business functions
- B . Minimization of the need decision making during a crisis
- C . Insurance against litigation following a disaster
- D . Protection from loss of organization resources
Which of the following is a PRIMARY advantage of using a third-party identity service?
- A . Consolidation of multiple providers
- B . Directory synchronization
- C . Web based logon
- D . Automated account management
What is the PRIMARY reason for implementing change management?
- A . Certify and approve releases to the environment
- B . Provide version rollbacks for system changes
- C . Ensure that all applications are approved
- D . Ensure accountability for changes to the environment
What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?
- A . Take the computer to a forensic lab
- B . Make a copy of the hard drive
- C . Start documenting
- D . Turn off the computer
The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life Cycle (SDLC)?
- A . System acquisition and development
- B . System operations and maintenance
- C . System initiation
- D . System implementation
When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?
- A . After the system preliminary design has been developed and the data security categorization has been performed
- B . After the vulnerability analysis has been performed and before the system detailed design begins
- C . After the system preliminary design has been developed and before the data security categorization begins
- D . After the business functional analysis and the data security categorization have been performed
What is the BEST approach to addressing security issues in legacy web applications?
- A . Debug the security issues
- B . Migrate to newer, supported applications where possible
- C . Conduct a security assessment
- D . Protect the legacy application with a web application firewall
Which of the following is the PRIMARY risk with using open source software in a commercial software construction?
- A . Lack of software documentation
- B . License agreements requiring release of modified code
- C . Expiration of the license agreement
- D . Costs associated with support of the software
A Java program is being developed to read a file from computer A and write it to computer B, using a third computer C. The program is not working as expected .
What is the MOST probable security feature of Java preventing the program from operating as intended?
- A . Least privilege
- B . Privilege escalation
- C . Defense in depth
- D . Privilege bracketing