CISSP Final

CISSP Final

Professional Development

98 Qs

quiz-placeholder

Similar activities

C_THR97_2205 - SAP SuccessFactors Onboarding 1H2022(99Questions)

C_THR97_2205 - SAP SuccessFactors Onboarding 1H2022(99Questions)

Professional Development

99 Qs

LATIHAN SOAL UJIAN 2025

LATIHAN SOAL UJIAN 2025

Professional Development

100 Qs

HOA Module 2: Gothic Architecture

HOA Module 2: Gothic Architecture

Professional Development

99 Qs

PREVIOUS SPLE 2023 PART 1

PREVIOUS SPLE 2023 PART 1

Professional Development

100 Qs

AWS SAA-C02 (Q1-Q100)

AWS SAA-C02 (Q1-Q100)

Professional Development

100 Qs

NURSING PRACTICE 4-FINAL PROOF READ

NURSING PRACTICE 4-FINAL PROOF READ

Professional Development

101 Qs

D57 MASTER THE DAY

D57 MASTER THE DAY

Professional Development

101 Qs

BMET Course 111.5

BMET Course 111.5

Professional Development

93 Qs

CISSP Final

CISSP Final

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Sylvia Anderson

Used 8+ times

FREE Resource

98 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In an infrastructure-as-a-service (IaaS) cloud model, who bears primary responsibility for securing physical and information assets?

Responsibility primarily rests with the customer

Responsibility primarily rests with the provider

Responsibility is shared between the customer and provider

Responsibility primarily rests with the cloud access security broker

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a federated identity access management solution, what task is most commonly handled by the identity provider (IdP)?

Identification

Authorization

Provisioning

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are working with a team of software and hardware developers on the creation of a new product that will deploy sensors to factory floors and then analyze the data from those sensors using a back-end SaaS solution. Before you develop the software, you would like to understand the potential paths that an attacker could take to undermine the security of the system. What activity would best provide you with this perspective?

Threat hunting

Threat modeling

Penetration testing

Vulnerability scanning

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You recently performed a vulnerability assessment and found hundreds of vulnerabilities in your organization's infrastructure. It will take months to address all of these issues. What factors should you use to prioritize these vulnerabilities?

Likelihood and probability

Impact and exploitability

Impact and CVSS score

Likelihood and impact

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are attempting to secure a wired network belonging to your organization. You would like to deploy technology that limits network access to authorized users. Which one of the following technologies would best meet that need?

WiFi Protected Access v2 (WPA2)

WiFi Protected Access v3 (WPA3)

IEEE 802.1x

MAC filtering

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user connected a device to your network and, when they open their web browser, are redirected to a website advising them that they have been placed on an isolation network because their system does not meet the organization's security requirements. They are unable to access any network resources until they remediate their device to comply with the organization's security policy. What type of security solution is in use on this network?

Intrusion Prevention System (IPS)

Configuration Management (CM) platform

Network Access Control (NAC)

Endpoint Detection and Response (EDR) platform

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have been asked to assist in the investigation of a security incident that took place in your organization. You are handed a laptop computer that is powered off and asked to analyze the data contained on its hard drive. What action should you take first?

Remove the hard drive from the device

Power on the laptop

Connect to the hard drive with a forensic software package

Connect a write blocker to the device

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Professional Development