Rate this post

ISC CISSPリアル試験問題解答は無料

試験問題集でCISSP練習無料最新のISC練習テスト

ISC CISSP 認定試験の出題範囲:

トピック 出題範囲
トピック 1
  • セキュリティとリスク管理
  • 資産セキュリティ
トピック 2
  • セキュリティアーキテクチャおよび
  • セキュリティ運用
トピック 3
  • 通信とネットワークセキュリティ
トピック 4
  • IDおよびアクセス管理(IAM)
トピック 5
  • ソフトウェア開発セキュリティ

 

質問499、 Which of the following steps is NOT one of the eight detailed steps of a Business Impact Assessment (BIA):

 
 
 
 

質問500、 To prevent inadvertent disclosure of restricted information, which of the following would be the LEAST effective process for eliminating data prior to the media being discarded?

 
 
 
 

質問501、 Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?

 
 
 
 

質問502、 The equation used to calculate the total number of symmetric keys (K) needed for a group of users (N) to communicate securely with each other is given by which of the following?

 
 
 
 

質問503、 What is the maximum allowable key size of the Rijndael encryption algorithm?

 
 
 
 

質問504、 For a given hash function H, to prevent substitution of a message M1 for
a message M2, it is necessary that:

 
 
 
 

質問505、 Which of the following statements is most accurate regarding a digital signature?

 
 
 
 

質問506、 Which of the following is held accountable for the risk to organizational systems and data that result from outsourcing Information Technology (IT) systems and services?

 
 
 
 

質問507、 An access control policy for a bank teller is an example of the implementation of which of the following?

 
 
 
 

質問508、 Refer to the information below to answer the question.
Desktop computers in an organization were sanitized for re-use in an equivalent security environment. The data was destroyed in accordance with organizational policy and all marking and other external indications of the sensitivity of the data that was formerly stored on the magnetic drives were removed.
Organizational policy requires the deletion of user data from Personal Digital Assistant
(PDA) devices before disposal. It may not be possible to delete the user data if the device is malfunctioning. Which destruction method below provides the BEST assurance that the data has been removed?

 
 
 
 

質問509、 An organization is considering outsourcing applications and data to a Cloud Service Provider (CSP). Which of the following is the MOST important concern regarding privacy?

 
 
 
 

質問510、 In a hierarchical PKI the highest CA is regularly called Root CA, it is also referred to by which one of the following term?

 
 
 
 

質問511、 What is the name of the software that prevents users from seeing all items or directories on a computer and is most commonly found in the UNIX/Linux environment?

 
 
 
 
 

質問512、 What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

 
 
 
 

質問513、 Which of the following was not designed to be a proprietary encryption algorithm?

 
 
 
 

質問514、 Which choice below is NOT a common example of exercising due care or
due diligence in security practices?

 
 
 
 

質問515、 In terms or Risk Analysis and dealing with risk, which of the four common ways listed below seek to eliminate involvement with the risk being evaluated?

 
 
 
 

質問516、 Which of the following BEST describes a function relying on a shared secret key that is used along with a hashing algorithm to verify the integrity of the communication content as well as the sender?

 
 
 
 

質問517、 In non-discretionary access control using Role Based Access Control (RBAC), a central authority determines what subjects can have access to certain objects based on the organizational security policy.
The access controls may be based on:

 
 
 
 

質問518、 A network-based vulnerability assessment is a type of test also referred to as:

 
 
 
 

質問519、 Which of the following is the most secure firewall implementation?

 
 
 
 

確認済みCISSP試験問題集と解答で時間限定無料提供!CISSPには正解付き:https://www.goshiken.com/ISC/CISSP-mondaishu.html