CISSP Practice Questions (121–140)

← Back to CISSP Quiz

Question 121

Question 121

Where can the OWASP list of associated vulnerabilities be found?
A. OWASP Top 10 Project
B. OWASP SAMM
C. OWASP Guide Project
D. OWASP Mobile Project

Question 122

Question 122

Which vulnerability assessment activity BEST exemplifies the 'Examine' method?
A. Review system logs
B. Perform port scans
C. Ask ISSO about patch process
D. Logging into a web server with default admin credentials

Question 123

Question 123

Within a large organization, which business unit is BEST positioned to handle provisioning and deprovisioning of user accounts?
A. Training
B. Internal Audit
C. Human Resources
D. IT

Question 124

Question 124

After a ransomware attack, management wants improved availability and reduced RTO. Which solution should be implemented?
A. Virtualization
B. Antivirus
C. Process isolation
D. HIPS

Question 125

Question 125

Which BEST describes the purpose of a reference monitor when defining access control?
A. Ensure quality by design
B. Validate organizational access policies
C. Cyber hygiene for system health
D. Keep staff safe

Question 126

Question 126

What must be met during internal security audits to ensure objectivity and prevent retaliation?
A. Auditor must be independent and report directly to management
B. Auditor must use automated tools
C. Auditor must work closely with IT
D. Auditor must manually review processes

Question 127

Question 127

A company resells decommissioned drives to vendors. Which data sanitization method ensures security while retaining resale value?
A. Pinning
B. Clearing
C. Purging
D. Overwriting

Question 128

Question 128

Why is classifying data important during a risk assessment?
A. Framework for metrics
B. Justify security control cost
C. Classify control sensitivity
D. Determine appropriate control level

Question 129

Question 129

OWASP SAMM allows organizations to assess impact based on which risk management aspect?
A. Risk tolerance
B. Risk exception
C. Risk treatment
D. Risk response

Question 130

Question 130

A fiber link between two campuses is broken. Which tool detects the exact break point?
A. OTDR
B. Tone generator
C. Fusion splicer
D. Cable tester

Question 131

Question 131

A software architect building a global content platform should focus primarily on:
A. Service-oriented architecture
B. Media caching methodology
C. ISP relationships
D. WAN design

Question 132

Question 132

Which datacenter architecture is most likely used in large SDN and extends beyond the datacenter?
A. iSCSI
B. FCoE
C. Three-tiered
D. Spine-and-leaf

Question 133

Question 133

What is the MOST common use of Online Certificate Status Protocol (OCSP)?
A. Get expiration date of a certificate
B. Get revocation status
C. Get author name
D. Verify certificate validity

Question 134

Question 134

Which of the following is the PRIMARY type of cryptography required to support non-repudiation of a digitally signed document?
A. Message digest (MD)
B. Asymmetric
C. Symmetric
D. Hashing

Question 135

Question 135

Which of the following is the MOST important first step in preparing for a security audit?
A. Identify team members.
B. Define the scope.
C. Notify system administrators.
D. Collect evidence.

Question 136

Question 136

Which of the following should be done at a disaster site before any item is removed, repaired, or replaced?
A. Take photos of the damage.
B. Notify all of the Board of Directors.
C. Communicate with the press.
D. Dispatch personnel to the disaster recovery site.

Question 137

Question 137

Which of the following is the MOST common use of the Online Certificate Status Protocol (OCSP)?
A. To obtain the expiration date of an X.509 digital certificate
B. To obtain the revocation status of an X.509 digital certificate
C. To obtain the author name of an X.509 digital certificate
D. To verify the validity of an X.509 digital certificate

Question 138

Question 138

An organization’s retail website provides its only source of revenue, so the disaster recovery plan must document estimated time for each recovery step. Which step would take the longest?
A. Update NAT table.
B. Update DNS with domain registrar.
C. Update BGP autonomous system number.
D. Update web server network configuration.

Question 139

Question 139

When resolving ethical conflicts, in what order should an information security professional prioritize responsibilities?
A. Public safety, duties to individuals, duties to the profession, duties to principals
B. Public safety, duties to principals, duties to individuals, duties to the profession
C. Public safety, duties to the profession, duties to principals, duties to individuals
D. Public safety, duties to individuals, duties to the profession, duties to principals

Question 140

Question 140

What HTTP response header disables execution of inline JavaScript and eval()-type functions?
A. Strict-Transport-Security
B. X-XSS-Protection
C. X-Frame-Options
D. Content-Security-Policy