Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CISSP (ISC)² Certification Practice Exams and Tests

You're reading from   CISSP (ISC)² Certification Practice Exams and Tests Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version

Arrow left icon
Product type Paperback
Published in Sep 2021
Publisher Packt
ISBN-13 9781800561373
Length 396 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ted Jordan Ted Jordan
Author Profile Icon Ted Jordan
Ted Jordan
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Chapter I: Scheduling the CISSP Exam 2. Chapter 1: Security and Risk Management Domain 1 Practice Questions FREE CHAPTER 3. Chapter 2: Asset Security Domain 2 Practice Questions 4. Chapter 3: Security Architecture and Engineering Domain 3 Practice Questions 5. Chapter 4: Communication and Network Security Domain 4 Practice Questions 6. Chapter 5: Identity and Access Management Domain 5 Practice Questions 7. Chapter 6: Security Assessment and Testing Domain 6 Practice Questions 8. Chapter 7: Security Operations Domain 7 Practice Questions 9. Chapter 8: Software Development Security Domain 8 Practice Questions 10. Chapter 9: Full Practice Exam Exam 1 11. Chapter 10: Full Practice Exam Exam 2 12. Other Books You May Enjoy

Answers with explanations

  1. Answer: C Code reviews, or static analysis, are used to help others write more efficient code and watch for security vulnerabilities such as buffer overflows or backdoors. Dynamic analysis tests how the code operates when it runs. Fuzzing tests user input into applications, while passive testing monitors software as it runs.
  2. Answer: B Since her private key matches the public key of the letter, she cannot repudiate that she sent the email. It is still possible that someone sent the email from her account when she stepped away from her computer, and that could be determined through video analysis or other investigations.
  3. Answer: B Complete mediation designs ensure that access to an object is checked for authority. Whenever a subject accesses an object, the action must be mediated to ensure the subject has the required privilege.
  4. Answer: B The Open Web Application Security Project (OWASP) provides tools to mitigate web application vulnerabilities...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image