5 questions would be shown from a total of 30 free practice questions to prepare you for CISSP exam. Enjoy!
1 / 5
1. Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model? Explanation/Reference:
Reference: https://www.sans.org/reading-room/whitepapers/protocols/applying-osi-layer-network-model- information-security-1309 (10)
2 / 5
2. Directive controls are a form of change management policy and procedures. Which of the following subsections are recommended as part of the change management process? Explanation/Reference:
Reference: https://books.google.com.pk/books?id=9gCn86CmsNQC&pg=PA570&lpg=PA570&dq=CISSP +Directive+controls+are+a+form+of+change+management+policy+and+procedures.+Which+of+the+following +subsections+are+recommended+as+part+of+the+change+management +process&source=bl&ots=riGvVpSS3E&sig=ACfU3U3dLYheW_GfTZcAYfN97fnDFlMmZg&hl=en&sa=X&ved= 2ahUKEwjukoqK96npAhULtRoKHZEpBmcQ6AEwAHoECBQQAQ#v=onepage&q=CISSP%20Directive% 20controls%20are%20a%20form%20of%20change%20management%20policy%20and%20procedures.% 20Which%20of%20the%20following%20subsections%20are%20recommended%20as%20part%20of%20the% 20change%20management%20process&f=false
3 / 5
3. Which of the following BEST describes the responsibilities of a data owner? Explanation/Reference:
Reference: http://resources.infosecinstitute.com/category/certifications-training/cissp/domains/asset-security/ data-and-system-ownership/#gref
4 / 5
4. Which of the following techniques BEST prevents buffer overflows? Explanation/Reference:
Explanation: Some products installed on systems can also watch for input values that might result in buffer overflows, but the best countermeasure is proper programming. This means use bounds checking. If an input value is only sup-posed to be nine characters, then the application should only accept nine characters and no more. Some languages are more susceptible to buffer overflows than others, so programmers should understand these issues, use the right languages for the right purposes, and carry out code review to identify buffer overflow vulnerabilities.
5 / 5
5. An application team is running tests to ensure that user entry fields will not accept invalid input of any length. Explanation/Reference: What type of negative testing is this an example of?
Reference: https://www.softwaretestinghelp.com/what-is-negative-testing/
Your score is
The average score is 54%
Practice Again
More IT practice tests CLICK HERE
More IT practice tests
CLICK HERE