Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CISSP (ISC)² Certification Practice Exams and Tests

You're reading from   CISSP (ISC)² Certification Practice Exams and Tests Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version

Arrow left icon
Product type Paperback
Published in Sep 2021
Publisher Packt
ISBN-13 9781800561373
Length 396 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ted Jordan Ted Jordan
Author Profile Icon Ted Jordan
Ted Jordan
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Chapter I: Scheduling the CISSP Exam 2. Chapter 1: Security and Risk Management Domain 1 Practice Questions FREE CHAPTER 3. Chapter 2: Asset Security Domain 2 Practice Questions 4. Chapter 3: Security Architecture and Engineering Domain 3 Practice Questions 5. Chapter 4: Communication and Network Security Domain 4 Practice Questions 6. Chapter 5: Identity and Access Management Domain 5 Practice Questions 7. Chapter 6: Security Assessment and Testing Domain 6 Practice Questions 8. Chapter 7: Security Operations Domain 7 Practice Questions 9. Chapter 8: Software Development Security Domain 8 Practice Questions 10. Chapter 9: Full Practice Exam Exam 1 11. Chapter 10: Full Practice Exam Exam 2 12. Other Books You May Enjoy

Questions

  1. Candace suspects the Harvard diploma from the new employee is fake. What is her BEST next step to verify their background?

    A. Inspect the paper type of the diploma.

    B. Run a credit check.

    C. Contact the college verification department.

    D. Contact the employee's references.

  2. Technical controls are a type of access control for organizations. What are two other access-control types?

    A. Physical

    B. Turnstile

    C. Firewall

    D. Administrative

  3. Which of the following is considered the strongest form of authentication?

    A. Fingerprint scan

    B. Retinal scan

    C. Iris scan

    D. Password

  4. Annie is a security engineer seeking to improve authentication from using just a password, to a password and a smartphone authenticator that uses a time-based one-time password (TOTP). What type of authentication is she implementing?

    A. Two-factor authentication (2FA)

    B. Something you know

    C. Three-factor authentication (3FA)

    D. MFA

  5. Which type of communication connectors provide the BEST defense and...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image