[Newest Version] Free passitdump.com ISC CISSP PDF and Exam Questions Download 100% Pass Exam

[Newest Version] Free passitdump.com ISC CISSP PDF and Exam Questions Download 100% Pass Exam

passitdump.com – ISC dumps, braindumps, certification CISSP exam dumps. passitdump.com – CISSP certification with money back assurance. passitdump.com – best CISSP training and certification computer-based-training online resources. passitdump.com – the most professional CISSP certification exam practice questions and answers provider. easily pass your CISSP exams. just have a try!

CISSP free dumps are questions from the latest full CISSP dumps. Check CISSP free questions to get a better understanding of CISSP exams.

Question 1:

What capability would typically be included in a commercially available software package designed for access control?

A. Password encryption

B. File encryption

C. Source library control

D. File authentication

Correct Answer: A


Question 2:

During examination of Internet history records, the following string occurs within a Unique Resource Locator (URL):

http://www.companysite.com/products/products.asp?productid=123 or 1=1

What type of attack does this indicate?

A. Directory traversal

B. Structured Query Language (SQL) injection

C. Cross-Site Scripting (XSS)

D. Shellcode injection

Correct Answer: B


Question 3:

Which one of the following data integrity models assumes a lattice of integrity levels?

A. Take-Grant

B. Biba

C. Harrison-Ruzzo

D. Bell-LaPadula

Correct Answer: B


Question 4:

Which type of test would an organization perform in order to locate and target exploitable defects?

A. Penetration

B. System

C. Performance

D. Vulnerability

Correct Answer: A


Question 5:

Which of the following is MOST effective in detecting information hiding in Transmission Control Protocol/internet Protocol (TCP/IP) traffic?

A. Stateful inspection firewall

B. Application-level firewall

C. Content-filtering proxy

D. Packet-filter firewall

Correct Answer: A


Question 6:

An organization has discovered that users are visiting unauthorized websites using anonymous proxies.

Which of the following is the BEST way to prevent future occurrences?

A. Remove the anonymity from the proxy

B. Analyze Internet Protocol (IP) traffic for proxy requests

C. Disable the proxy server on the firewall

D. Block the Internet Protocol (IP) address of known anonymous proxies

Correct Answer: C


Question 7:

Which of the following is the MOST efficient mechanism to account for all staff during a speedy nonemergency evacuation from a large security facility?

A. Large mantrap where groups of individuals leaving are identified using facial recognition technology

B. Radio Frequency Identification (RFID) sensors worn by each employee scanned by sensors at each exitdoor

C. Emergency exits with push bars with coordinates at each exit checking off the individual against a predefined list

D. Card-activated turnstile where individuals are validated upon exit

Correct Answer: B


Question 8:

The organization would like to deploy an authorization mechanism for an Information Technology (IT) infrastructure project with high employee turnover.

Which access control mechanism would be preferred?

A. Attribute Based Access Control (ABAC)

B. Discretionary Access Control (DAC)

C. Mandatory Access Control (MAC)

D. Role-Based Access Control (RBAC)

Correct Answer: D


Question 9:

Which of the following is the MOST common method of memory protection?

A. Compartmentalization

B. Segmentation

C. Error correction

D. Virtual Local Area Network (VLAN) tagging

Correct Answer: B


Question 10:

An organization has outsourced its financial transaction processing to a Cloud Service Provider (CSP) who will provide them with Software as a Service (SaaS). If there was a data breach who is responsible for monetary losses?

A. The Data Protection Authority (DPA)

B. The Cloud Service Provider (CSP)

C. The application developers

D. The data owner

Correct Answer: B


Question 11:

In Disaster Recovery (DR) and Business Continuity (DC) training, which BEST describes a functional drill?

A. a functional evacuation of personnel

B. a specific test by response teams of individual emergency response functions

C. an activation of the backup site

D. a full-scale simulation of an emergency and the subsequent response functions.

Correct Answer: D


Question 12:

Which of the following steps should be performed FIRST when purchasing Commercial Off-The-Shelf (COTS) software?

A. undergo a security assessment as part of authorization process

B. establish a risk management strategy

C. harden the hosting server, and perform hosting and application vulnerability scans

D. establish policies and procedures on system and services acquisition

Correct Answer: D


Question 13:

Which of the following is the BEST way to reduce the impact of an externally sourced flood attack?

A. Have the service provider block the soiree address.

B. Have the soiree service provider block the address.

C. Block the soiree address at the firewall.

D. Block all inbound traffic until the flood ends.

Correct Answer: C


Question 14:

Which of the following is a common characteristic of privacy?

A. Provision for maintaining an audit trail of access to the private data

B. Notice to the subject of the existence of a database containing relevant credit card data

C. Process for the subject to inspect and correct personal data on-site

D. Database requirements for integration of privacy data

Correct Answer: A


Question 15:

Which of the following methods of suppressing a fire is environmentally friendly and the MOST appropriate for a data center?

A. Inert gas fire suppression system

B. Halon gas fire suppression system

C. Dry-pipe sprinklers

D. Wet-pipe sprinklers

Correct Answer: A