ISC CISSP Certified Information Systems Security Professional Online Training
ISC CISSP Online Training
The questions for CISSP were last updated at May 11,2025.
- Exam Code: CISSP
- Exam Name: Certified Information Systems Security Professional
- Certification Provider: ISC
- Latest update: May 11,2025
Which of the following actions should be performed when implementing a change to a database schema in a production system?
- A . Test in development, determine dates, notify users, and implement in production
- B . Apply change to production, run in parallel, finalize change in production, and develop a back-out strategy
- C . Perform user acceptance testing in production, have users sign off, and finalize change
- D . Change in development, perform user acceptance testing, develop a back-out strategy, and implement change
What is the ultimate objective of information classification?
- A . To assign responsibility for mitigating the risk to vulnerable systems
- B . To ensure that information assets receive an appropriate level of protection
- C . To recognize that the value of any item of information may change over time
- D . To recognize the optimal number of classification categories and the benefits to be gained from their use
Which of the following BEST represents the principle of open design?
- A . Disassembly, analysis, or reverse engineering will reveal the security functionality of the computer system.
- B . Algorithms must be protected to ensure the security and interoperability of the designed system.
- C . A knowledgeable user should have limited privileges on the system to prevent their ability to compromise security capabilities.
- D . The security of a mechanism should not depend on the secrecy of its design or implementation.
At a MINIMUM, a formal review of any Disaster Recovery Plan (DRP) should be conducted
- A . monthly.
- B . quarterly.
- C . annually.
- D . bi-annually.
A vulnerability test on an Information System (IS) is conducted to
- A . exploit security weaknesses in the IS.
- B . measure system performance on systems with weak security controls.
- C . evaluate the effectiveness of security controls.
- D . prepare for Disaster Recovery (DR) planning.
The BEST method of demonstrating a company’s security level to potential customers is
- A . a report from an external auditor.
- B . responding to a customer’s security questionnaire.
- C . a formal report from an internal auditor.
- D . a site visit by a customer’s security team.
Which of the following MUST be part of a contract to support electronic discovery of data stored in a cloud environment?
- A . Integration with organizational directory services for authentication
- B . Tokenization of data
- C . Accommodation of hybrid deployment models
- D . Identification of data location
Which of the following can BEST prevent security flaws occurring in outsourced software development?
- A . Contractual requirements for code quality
- B . Licensing, code ownership and intellectual property rights
- C . Certification of the quality and accuracy of the work done
- D . Delivery dates, change management control and budgetary control
Which of the following wraps the decryption key of a full disk encryption implementation and ties the hard disk drive to a particular device?
- A . Trusted Platform Module (TPM)
- B . Preboot eXecution Environment (PXE)
- C . Key Distribution Center (KDC)
- D . Simple Key-Management for Internet Protocol (SKIP)
A software scanner identifies a region within a binary image having high entropy .
What does this MOST likely indicate?
- A . Encryption routines
- B . Random number generator
- C . Obfuscated code
- D . Botnet command and control