Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CISSP (ISC)² Certification Practice Exams and Tests

You're reading from   CISSP (ISC)² Certification Practice Exams and Tests Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version

Arrow left icon
Product type Paperback
Published in Sep 2021
Publisher Packt
ISBN-13 9781800561373
Length 396 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ted Jordan Ted Jordan
Author Profile Icon Ted Jordan
Ted Jordan
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Chapter I: Scheduling the CISSP Exam 2. Chapter 1: Security and Risk Management Domain 1 Practice Questions FREE CHAPTER 3. Chapter 2: Asset Security Domain 2 Practice Questions 4. Chapter 3: Security Architecture and Engineering Domain 3 Practice Questions 5. Chapter 4: Communication and Network Security Domain 4 Practice Questions 6. Chapter 5: Identity and Access Management Domain 5 Practice Questions 7. Chapter 6: Security Assessment and Testing Domain 6 Practice Questions 8. Chapter 7: Security Operations Domain 7 Practice Questions 9. Chapter 8: Software Development Security Domain 8 Practice Questions 10. Chapter 9: Full Practice Exam Exam 1 11. Chapter 10: Full Practice Exam Exam 2 12. Other Books You May Enjoy

Questions

  1. The architecture for a secure network has several stakeholders. These include who?

    A. Company suppliers

    B. System operators

    C. Software developers

    D. Anyone concerned with the functionality or usability of the system

  2. Computers add multiple CPUs to improve performance. These systems are called what?

    A. Multiprocessing computers

    B. Multi-CPU computers

    C. Multithreaded computers

    D. Multiheaded computers

  3. After powering on a computer, it eventually boots the Linux operating system. Which of the following loads the kernel?

    A. BIOS

    B. MBR

    C. UEFI

    D. USER

  4. A device that resides on computer motherboards to manage cryptographic keys and passwords is called what?

    A. MBR

    B. HSM

    C. TCG

    D. TPM

  5. The primary difference between RAM and ROM is what?

    A. RAM data cannot be altered; ROM data can be altered.

    B. RAM loses data when powered off; ROM retains data when powered off.

    C. RAM has stored programs pre-loaded onto it; ROM comes stripped of programs.

    D. RAM retains data when powered off; ROM...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image