5 questions would be shown from a total of 30 free practice questions to prepare you for CISSP exam. Enjoy!
1 / 5
1. Which of the following BEST describes how access to a system is granted to federated user accounts? Explanation/Reference:
Reference: https://resources.infosecinstitute.com/cissp-domain-5-refresh-identity-and-access-management/
2 / 5
2. An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements? Explanation/Reference:
Reference: https://www.giac.org/paper/gsec/3873/information-warfare-cyber-warfare-future-warfare/106165 (14)
3 / 5
3. Which of the following techniques BEST prevents buffer overflows? Explanation/Reference:
Explanation: Some products installed on systems can also watch for input values that might result in buffer overflows, but the best countermeasure is proper programming. This means use bounds checking. If an input value is only sup-posed to be nine characters, then the application should only accept nine characters and no more. Some languages are more susceptible to buffer overflows than others, so programmers should understand these issues, use the right languages for the right purposes, and carry out code review to identify buffer overflow vulnerabilities.
4 / 5
4. Which of the following mobile code security models relies only on trust? Explanation/Reference:
Reference: https://csrc.nist.gov/csrc/media/publications/conference-paper/1999/10/21/proceedings-of-the- 22nd-nissc-1999/documents/papers/t09.pdf (11)
5 / 5
5. When implementing a data classification program, why is it important to avoid too much granularity? Explanation/Reference:
Reference: http://www.ittoday.info/AIMS/DSM/82-02-55.pdf
Your score is
The average score is 50%
Practice Again
More IT practice tests CLICK HERE
More IT practice tests
CLICK HERE