ISC CISSP Certified Information Systems Security Professional Online Training
ISC CISSP Online Training
The questions for CISSP were last updated at Apr 23,2025.
- Exam Code: CISSP
- Exam Name: Certified Information Systems Security Professional
- Certification Provider: ISC
- Latest update: Apr 23,2025
The use of private and public encryption keys is fundamental in the implementation of which of the following?
- A . Diffie-Hellman algorithm
- B . Secure Sockets Layer (SSL)
- C . Advanced Encryption Standard (AES)
- D . Message Digest 5 (MD5)
Which technique can be used to make an encryption scheme more resistant to a known plaintext attack?
- A . Hashing the data before encryption
- B . Hashing the data after encryption
- C . Compressing the data after encryption
- D . Compressing the data before encryption
Which security service is served by the process of encryption plaintext with the sender’s private key and decrypting cipher text with the sender’s public key?
- A . Confidentiality
- B . Integrity
- C . Identification
- D . Availability
Which of the following mobile code security models relies only on trust?
- A . Code signing
- B . Class authentication
- C . Sandboxing
- D . Type safety
Which of the following is the BEST network defense against unknown types of attacks or stealth attacks in progress?
- A . Intrusion Prevention Systems (IPS)
- B . Intrusion Detection Systems (IDS)
- C . Stateful firewalls
- D . Network Behavior Analysis (NBA) tools
An input validation and exception handling vulnerability has been discovered on a critical web-based system .
Which of the following is MOST suited to quickly implement a control?
- A . Add a new rule to the application layer firewall
- B . Block access to the service
- C . Install an Intrusion Detection System (IDS)
- D . Patch the application source code
An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer .
Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?
- A . Implement packet filtering on the network firewalls
- B . Install Host Based Intrusion Detection Systems (HIDS)
- C . Require strong authentication for administrators
- D . Implement logical network segmentation at the switches
Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?
- A . Layer 2 Tunneling Protocol (L2TP)
- B . Link Control Protocol (LCP)
- C . Challenge Handshake Authentication Protocol (CHAP)
- D . Packet Transfer Protocol (PTP)
Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?
- A . Packet filtering
- B . Port services filtering
- C . Content filtering
- D . Application access control
Which of the following factors contributes to the weakness of Wired Equivalent Privacy (WEP) protocol?
- A . WEP uses a small range Initialization Vector (IV)
- B . WEP uses Message Digest 5 (MD5)
- C . WEP uses Diffie-Hellman
- D . WEP does not use any Initialization Vector (IV)