Sunday 17 May 2020

CISSP Exam Questions - Pass Guaranteed

CISSP Exam Questions  Pass Guaranteed



If you are looking at complete file: Drop an email at moonintdubai@gmail.com




In Mandatory Access Control, sensitivity labels attached to object  contain what information?
A. The item's classification
B. The item's classification and category set
C. The item's category
D. The items's need  to know
Answer: B



Technical controls such as encryption and access control  can be built into the operating system, be software applications, or can be supplemental hardware/software units. Such
controls, also known as logical controls, represent which pairing? A. Preventive/Administrative Pairing
B. Preventive/Technical Pairing C. Preventive/Physical Pairing D. Detective/Technical Pairing
Answer: B

Which access control  model  achieves data integrity through well-formed transactions and
separation of duties? A. Clark-Wilson model B. Biba model
C. Non-interference model
D. Sutherland model
Answer: A

Which of the following access control  models requires security clearance for subjects? A. Identity-based access control
B. Role-based access control
C. Discretionary access control D. Mandatory access control Answer: D
What is called the verification that the user's claimed identity is valid and is usually implemented through a user password at log-on time?
A. Authentication B. Identification C. Integrity
D. Confidentiality
Answer: A

Which access model  is most appropriate for companies with a high employee turnover? A. Role-based access control
B. Mandatory access control
C. Lattice-based access control
D. Discretionary access control

Answer: A

What is the BEST answer pertaining to the difference between the Session and
Transport
layers of the OSI model?
A. The Session layer sets up communication between protocols, while the Transport layer
sets up connections between computer systems.
B. The Transport layer sets up communication between computer systems, while the
Session layer sets up connections between applications.
C. The Session layer sets up communication between computer systems, while the
Transport layer sets up connections between protocols.
D. The Transport layer sets up communication between applications, while the Session layer sets up connections between computer systems.
Answer: B

What refers to legitimate users accessing networked services that would normally be restricted to them?
A. Spoofing
B. Piggybacking C. Eavesdropping D. Logon abuse Answer: D
What is called an attack where  the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to
flood it with REPLY packets? A. SYN Flood attack
B. Smurf attack
C. Ping of Death attack
D. Denial of Service (DOS) attack
Answer: B