[Realistic] CISSP ISC2 exam topics 111-120 (Mar 2021)

Act now and download your ISC2 CISSP test today! Do not waste time for the worthless ISC2 CISSP tutorials. Download Abreast of the times ISC2 Certified Information Systems Security Professional (CISSP) exam with real questions and answers and begin to learn ISC2 CISSP with a classic professional.

2021 Mar CISSP free question

Q111. In Business Continuity Planning (BCP), what is the importance of documenting business processes? 

A. Provides senior management with decision-making tools 

B. Establishes and adopts ongoing testing and maintenance strategies 

C. Defines who will perform which functions during a disaster or emergency 

D. Provides an understanding of the organization's interdependencies 

Answer:


Q112. Which one of the following considerations has the LEAST impact when considering transmission security? 

A. Network availability 

B. Data integrity 

C. Network bandwidth 

D. Node locations 

Answer:


Q113. Which of the following is the MAIN goal of a data retention policy? 

A. Ensure.that data is destroyed properly. 

B. Ensure that data recovery can be done on the data. 

C. Ensure the integrity and availability of data for a predetermined amount of time. 

D. Ensure.the integrity and confidentiality of data for a predetermined amount of time. 

Answer:


Q114. Following the completion of a network security assessment, which of the following can BEST be demonstrated? 

A. The effectiveness of controls can be accurately measured 

B. A penetration test of the network will fail 

C. The network is compliant to industry standards 

D. All unpatched vulnerabilities have been identified 

Answer:


Q115. Which of the following wraps the decryption key of a full disk encryption implementation and ties the hard disk drive to a particular device? 

A. Trusted Platform Module (TPM) 

B. Preboot eXecution Environment (PXE) 

C. Key Distribution Center (KDC) 

D. Simple Key-Management for Internet Protocol (SKIP) 

Answer:


Leading CISSP practice:

Q116. Refer.to the information below to answer the question. 

A security practitioner detects client-based attacks on the organization’s network. A plan will be necessary to address these concerns. 

In the plan, what is the BEST approach to mitigate future internal client-based attacks? 

A. Block all client side web exploits at the perimeter. 

B. Remove all non-essential client-side web services from the network. 

C. Screen for harmful exploits of client-side services before implementation. 

D. Harden the client image before deployment. 

Answer:


Q117. Which of the following is the MOST difficult to enforce when using cloud computing? 

A. Data access 

B. Data backup 

C. Data recovery 

D. Data disposal 

Answer:


Q118. What is one way to mitigate the risk of security flaws in.custom.software? 

A. Include security language in the Earned Value Management (EVM) contract 

B. Include security assurance clauses in the Service Level Agreement (SLA) 

C. Purchase only Commercial Off-The-Shelf (COTS) products 

D. Purchase only software with no open source Application Programming Interfaces (APIs) 

Answer:


Q119. The process of mutual authentication involves a computer system authenticating a user and authenticating the 

A. user to the audit process. 

B. computer system to the user. 

C. user's access to all authorized objects. 

D. computer system to the audit process. 

Answer:


Q120. Which of the following is the BEST way to verify the integrity of a software patch? 

A. Cryptographic checksums 

B. Version numbering 

C. Automatic updates 

D. Vendor assurance 

Answer:



see more CISSP dumps