★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW CISSP Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/CISSP-dumps.html


Exam Code: cissp exam (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Certified Information Systems Security Professional (CISSP)
Certification Provider: ISC2
Free Today! Guaranteed Training- Pass cissp all in one Exam.

Q181. Which of the following provides the MOST protection against data theft of sensitive information when a laptop is stolen? 

A. Set up a BIOS and operating system password 

B. Encrypt the virtual drive where confidential files can be stored 

C. Implement a mandatory policy in which sensitive data cannot be stored on laptops, but only on the corporate network 

D. Encrypt the entire disk and delete contents after a set number of failed access attempts 

Answer:


Q182. By.carefully.aligning.the.pins.in.the.lock, which of the following defines the opening of a mechanical lock without the proper key? 

A. Lock pinging 

B. Lock picking 

C. Lock bumping 

D. Lock bricking 

Answer:


Q183. What is the MOST critical factor to achieve the goals of a security program? 

A. Capabilities of security resources 

B. Executive management support 

C. Effectiveness of security management 

D. Budget approved for security resources 

Answer:


Q184. What security management control is MOST often broken by collusion? 

A. Job rotation 

B. Separation of duties 

C. Least privilege model 

D. Increased monitoring 

Answer:


Q185. Which of the following analyses is performed to protect information assets? 

A. Business impact analysis 

B. Feasibility analysis 

C. Cost benefit analysis 

D. Data analysis 

Answer:


Q186. Refer.to the information below to answer the question. 

An organization experiencing a negative financial impact is forced to reduce budgets and the number of Information Technology (IT) operations staff performing basic logical access security administration functions. Security processes have been tightly integrated into normal IT operations and are not separate and distinct roles. 

Which of the following will be the PRIMARY security concern as staff is released from the organization? 

A. Inadequate IT support 

B. Loss of data and separation of duties 

C. Undocumented security controls 

D. Additional.responsibilities for remaining staff 

Answer:


Q187. In Disaster Recovery (DR) and business continuity training, which BEST describes a functional drill? 

A. A full-scale simulation of an emergency and the subsequent response functions 

B. A specific test by response teams of individual emergency response functions 

C. A functional evacuation of personnel 

D. An activation of the backup site 

Answer:


Q188. Which of the following is the MOST beneficial to review when performing an IT audit? 

A. Audit policy 

B. Security log 

C. Security policies 

D. Configuration settings 

Answer:


Q189. Which of the following is ensured when hashing files during chain of custody handling? 

A. Availability 

B. Accountability 

C. Integrity 

D. Non-repudiation 

Answer:


Q190. Which of the following is the BEST countermeasure to brute force login attacks? 

A. Changing all canonical passwords 

B. Decreasing the number of concurrent user sessions 

C. Restricting initial password delivery only in person 

D. Introducing a delay after failed system access attempts 

Answer: