5 questions would be shown from a total of 30 free practice questions to prepare you for CISSP exam. Enjoy!
1 / 5
1. A manufacturing organization wants to establish a Federated Identity Management (FIM) system with its 20 different supplier companies. Which of the following is the BEST solution for the manufacturing organization? Explanation/Reference:
Reference: https://www.netiq.com/documentation/access-manager-43/applications-configuration-guide/data/ b1ka6lkd.html
2 / 5
2. What testing technique enables the designer to develop mitigation strategies for potential vulnerabilities? Explanation/Reference:
Reference: https://owasp.org/www-project-web-security-testing-guide/assets/archive/ OWASP_Testing_Guide_v4.pdf (15)
3 / 5
3. When is a Business Continuity Plan (BCP) considered to be valid? Explanation/Reference:
Reference: http://www.manchester.gov.uk/info/200039/emergencies/6174/business_continuity_planning/5
4 / 5
4. Which of the following needs to be taken into account when assessing vulnerability? Explanation/Reference:
Reference: https://books.google.com.pk/books?id=9gCn86CmsNQC&pg=PA478&lpg=PA478&dq=CISSP +taken+into+account+when+assessing+vulnerability&source=bl&ots=riGvVpNN7I&sig=ACfU3U1isazG0OJlZdAAy91LvAW_rbXdAQ&hl=en&sa=X&ve d=2ahUKEwj6p9vg4qnpAhUNxYUKHdODDZ4Q6AEwDHoECBMQAQ#v=onepage&q=CISSP%20taken% 20into%20account%20when%20assessing%20vulnerability&f=false
5 / 5
5. A security architect plans to reference a Mandatory Access Control (MAC) model for implementation. This indicates that which of the following properties are being prioritized? Explanation/Reference:
Explanation: Mandatory Access Control (MAC) is system-enforced access control based on a subject’s clearance and an object’s labels. Subjects and Objects have clearances and labels, respectively, such as confidential, secret, and top secret. A subject may access an object only if the subject’s clearance is equal to or greater than the object’s label. Subjects cannot share objects with other subjects who lack the proper clearance, or “write down” objects to a lower classification level (such as from top secret to secret). MAC systems are usually focused on preserving the confidentiality of data.
Reference: https://www.sciencedirect.com/topics/computer-science/mandatory-access-control
Your score is
The average score is 54%
Practice Again
More IT practice tests CLICK HERE
More IT practice tests
CLICK HERE