Reader small image

You're reading from  CISSP (ISC)² Certification Practice Exams and Tests

Product typeBook
Published inSep 2021
PublisherPackt
ISBN-139781800561373
Edition1st Edition
Right arrow
Author (1)
Ted Jordan
Ted Jordan
author image
Ted Jordan

Ted Jordan, MSc, CISSP has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He learned C language and UNIX administration while completing his Masters at UC Berkeley, and started his career at General Motors as an undergraduate of Kettering University in Flint, MI. He also did engineering with Silicon Graphics, The CAVE Virtual Reality, and SUN Microsystems. He trains and holds the CISSP, LPIC-1, Linux+, SUSE Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications. He is Founder and President of two successful tech startup companies including Funutation Tekademy Inc which teaches kids to program robots and write video games through their franchise operators. Ted lives with his family near Milwaukee, WI and enjoys tennis, golf, and karaoke.
Read more about Ted Jordan

Right arrow

Chapter 9: Full Practice Exam Exam 1

This chapter contains practice exam questions from all eight domains, and they are weighted as if you were taking the real CISSP exam, as follows:

  • 15% from Security and Risk Management
  • 10% from Asset Security
  • 13% from Security Architecture and Engineering
  • 13% from Communication and Network Security
  • 13% from Identity and Access Management
  • 12% from Security Assessment and Testing
  • 13% from Security Operations
  • 11% from Software Development Security

Please give yourself 2 hours (120 minutes) maximum to complete the exam. Based on my experience of training hundreds of professionals to study and pass the CISSP exam, after thorough studying, if you score 85% or more on these practice exams, you are ready for the real exam.

At the end of this exam, you'll find the necessary answer sheet, as well as a list of which questions belong to which domains. For any questions you get wrong, do more research and...

Questions

  1. Frederick automatically backs up his smartphone on the cloud. Which of the following does this represent?

    A. Safety

    B. Integrity

    C. Availability

    D. Confidentiality

  2. Beth is an auditor determining which department and systems to examine for an audit. She also needs details about which processes to monitor. This is an example of which phase of the audit?

    A. Executing exploits

    B. Running reconnaissance

    C. Defining the scope

    D. Conducting documentation

  3. The security approach of complete mediation provides which feature?

    A. A security design where a kernel protects the hardware

    B. A security design where all access is verified

    C. A security design that preserves data integrity

    D. A security design using defense in depth

  4. The device that resides on system motherboards to manage encryption and passwords is called what?

    A. HSM

    B. TCG

    C. MBR

    D. TPM

  5. What communication connectors provide the BEST defense and security for leaked authentication vulnerabilities?

    A. RJ-45

    B. SC

    C. BNC...

Answer key

Domain key

lock icon
The rest of the chapter is locked
You have been reading a chapter from
CISSP (ISC)² Certification Practice Exams and Tests
Published in: Sep 2021Publisher: PacktISBN-13: 9781800561373
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Author (1)

author image
Ted Jordan

Ted Jordan, MSc, CISSP has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He learned C language and UNIX administration while completing his Masters at UC Berkeley, and started his career at General Motors as an undergraduate of Kettering University in Flint, MI. He also did engineering with Silicon Graphics, The CAVE Virtual Reality, and SUN Microsystems. He trains and holds the CISSP, LPIC-1, Linux+, SUSE Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications. He is Founder and President of two successful tech startup companies including Funutation Tekademy Inc which teaches kids to program robots and write video games through their franchise operators. Ted lives with his family near Milwaukee, WI and enjoys tennis, golf, and karaoke.
Read more about Ted Jordan