Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CISSP PRACTICE TEST ||d

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
14-09-2025
Written in
2025/2026

CISSP PRACTICE TEST QUESTIONS WITH ANSWERS||d . Access control model is: - Answer-A formal control model is a formal description of a security policy. .. Evidence like printed business records, manuals, and, printouts are classified as: - Answer-Real evidence .. Fastest backup restoration time is provided by combination - Answer-Full backups and differential backups .. Which type of firewall can be used to track connectionless protocols such as UDP and RPC? - Answer-Stateful inspection firewall .A commercial application of steganography that is used to identify documents or verify their authenticity is ---- - Answer-A watermark .A contingency plan should address which of the following - Answer-Potential risks, residual risks, identified risk .Access to audit reports be controlled and restricted because: - Answer-They contain info about the vulnerabilities of the system .According to RFC 1087, 'Ethics and the Internet,' which of the following statement is considered unethical? - Answer-actions that compromise the privacy of users .Active attack includes - Answer-Masquarading .Allowing access to resources based on permitted IP addresses is definition of: - Answer-ACL .Another name for the Orange Book - Answer-The Trusted Computer System Eval. Criteria (TCSEC) .At which layer of OSI model encryption is not possible? - Answer-Cipher Block Chaining & Cipher Feedback .At which layer of OSI model encryption is not possible? - Answer-Data Link Layer .Audit trails are ------ type of security controls. - Answer

Show more Read less
Institution
CISSP - Certified Information Systems Security Professional
Course
CISSP - Certified Information Systems Security Professional

Content preview

CISSP PRACTICE TEST QUESTIONS
WITH ANSWERS||d

\. Access control model is: - Answer-A formal control model is a formal description of a
security policy.

\.. Evidence like printed business records, manuals, and, printouts are classified as: -
Answer-Real evidence

\.. Fastest backup restoration time is provided by combination - Answer-Full backups
and differential backups

\.. Which type of firewall can be used to track connectionless protocols such as UDP
and RPC? - Answer-Stateful inspection firewall

\.A commercial application of steganography that is used to identify documents or verify
their authenticity is ---- - Answer-A watermark

\.A contingency plan should address which of the following - Answer-Potential risks,
residual risks, identified risk

\.Access to audit reports be controlled and restricted because: - Answer-They contain
info about the vulnerabilities of the system

\.According to RFC 1087, 'Ethics and the Internet,' which of the following statement is
considered unethical? - Answer-actions that compromise the privacy of users

\.Active attack includes - Answer-Masquarading

\.Allowing access to resources based on permitted IP addresses is definition of: -
Answer-ACL

\.Another name for the Orange Book - Answer-The Trusted Computer System Eval.
Criteria (TCSEC)

\.At which layer of OSI model encryption is not possible? - Answer-Cipher Block
Chaining & Cipher Feedback

\.At which layer of OSI model encryption is not possible? - Answer-Data Link Layer

\.Audit trails are ------ type of security controls. - Answer-Passive

, \.Biometrics that can last a lifetime - Answer-Iris pattern

\.Buffer overflow and boundary condition errors are examples of: - Answer-Input
validation errors

\.Business continuity plan developed is based mostly on - Answer-Business Impact
Analysis

\.Calculate Single Loss Expectancy (SLE) for Jet Industries which expects that it would
lose $40 million, if flash floods struck its aircraft operations facility. - Answer-
$40,000,000 [amount of damage that would be caused by a single occurrence of the
risk]

\.Cat5 and Cat6 Categories are examples of - Answer-Twisted Pair

\.Clipping levels refers to: - Answer-Settling Allowable Thresholds on a Reported Activity

\.Computer center fires are generally caused by: - Answer-Electric distribution system

\.Detective technical control - Answer-IDS, Violation Reports, Honeypot

\.Disaster Recovery Planning's objective is: - Answer-Restoring normal business activity

\.During which phase of SDLC should Security and access controls be incorporated? -
Answer-Detailed design

\.Ethernet LAN in a bus topology is prone to unauthorized disclosure than switched
Ethernet in a star topology because - Answer-Ethernet is a broadcast technology

\.Ethics are - Answer-rules of personal behavior

\.Examples of operation control - Answer-Backup and recovery, contingency planning,
operations procedures

\.Fastest backup creation time is provided by combination - Answer-Full backups and
incremental backups

\.Fault tolerance safeguards help us to combat threats to - Answer-Data Reliability

\.Fraudulent use of a telephone service? - Answer-Phreaking

\.How a subject gets access to an object in Multi-Level Security Policy? - Answer-The
subjects sensitivity label must dominate the object's sensitivity label

Written for

Institution
CISSP - Certified Information Systems Security Professional
Course
CISSP - Certified Information Systems Security Professional

Document information

Uploaded on
September 14, 2025
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers
$11.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Thumbnail
Package deal
CISSP TEST QUESTIONS WITH VERIFIED ANSWERS
-
5 2025
$ 77.95 More info

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
IszackBd University Of Washington
View profile
Follow You need to be logged in order to follow users or courses
Sold
23
Member since
1 year
Number of followers
2
Documents
4222
Last sold
2 days ago
IszackBd Stuvia

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. FOR ANY REQUEST FEEL FREE TO REACH US

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions