5 questions would be shown from a total of 30 free practice questions to prepare you for CISSP exam. Enjoy!
1 / 5
1. A security architect plans to reference a Mandatory Access Control (MAC) model for implementation. This indicates that which of the following properties are being prioritized? Explanation/Reference:
Explanation: Mandatory Access Control (MAC) is system-enforced access control based on a subject’s clearance and an object’s labels. Subjects and Objects have clearances and labels, respectively, such as confidential, secret, and top secret. A subject may access an object only if the subject’s clearance is equal to or greater than the object’s label. Subjects cannot share objects with other subjects who lack the proper clearance, or “write down” objects to a lower classification level (such as from top secret to secret). MAC systems are usually focused on preserving the confidentiality of data.
Reference: https://www.sciencedirect.com/topics/computer-science/mandatory-access-control
2 / 5
2. An application team is running tests to ensure that user entry fields will not accept invalid input of any length. Explanation/Reference: What type of negative testing is this an example of?
Reference: https://www.softwaretestinghelp.com/what-is-negative-testing/
3 / 5
3. Which of the following is the final phase of the identity and access provisioning lifecycle? Explanation/Reference:
Reference: https://books.google.com.pk/books?id=W2TvAgAAQBAJ&pg=PA256&lpg=PA256&dq=process+in +the+access+provisioning+lifecycle+that+will+MOST+likely+identify+access+aggregation +issues&source=bl&ots=OBJo9fbGP3&sig=ACfU3U1eAWDu3q4EoiusrOi_hvtu6WyaIg&hl=en&sa=X&ved=2ah UKEwiu-Mac0anpAhXIxIUKHQi2BFsQ6AEwAXoECBAQAQ#v=onepage&q=process%20in%20the%20access %20provisioning%20lifecycle%20that%20will%20MOST%20likely%20identify%20access%20aggregation% 20issues&f=false
4 / 5
4. Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following? Explanation/Reference:
Reference: http://www.pearsonitcertification.com/articles/article.aspx?p=1329710&seqNum=3
5 / 5
5. Which of the following mobile code security models relies only on trust? Explanation/Reference:
Reference: https://csrc.nist.gov/csrc/media/publications/conference-paper/1999/10/21/proceedings-of-the- 22nd-nissc-1999/documents/papers/t09.pdf (11)
Your score is
The average score is 50%
Practice Again
More IT practice tests CLICK HERE
More IT practice tests
CLICK HERE