5 questions would be shown from a total of 30 free practice questions to prepare you for CISSP exam. Enjoy!
1 / 5
1. A user downloads a file from the Internet, then applies the Secure Hash Algorithm 3 (SHA-3) to it. Which of the following is the MOST likely reason for doing so? Explanation/Reference:
Reference: https://blog.logsign.com/how-to-check-the-integrity-of-a-file/
2 / 5
2. Which of the following is the MOST important activity an organization performs to ensure that security is part of the overall organization culture? Explanation/Reference:
Reference: https://techbeacon.com/security/6-ways-develop-security-culture-top-bottom
3 / 5
3. What determines the level of security of a combination lock? Explanation/Reference:
Reference: https://books.google.com.pk/books?id=RbihG-YALUkC&pg=PA976&lpg=PA976&dq=CISSP +determines+the+level+of+security+of+a+combination+lock&source=bl&ots=ld6arg_Pl9&sig=ACfU3U0kh_Trrg6mQ65NmAP5PnUCIPmD0Q&hl=en&sa=X&ved=2ah UKEwjg69zN4KnpAhUJmRoKHR01B_MQ6AEwDHoECBUQAQ#v=onepage&q=combination%20lock&f=false
4 / 5
4. Which of the following BEST describes how access to a system is granted to federated user accounts? Explanation/Reference:
Reference: https://resources.infosecinstitute.com/cissp-domain-5-refresh-identity-and-access-management/
5 / 5
5. An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements? Explanation/Reference:
Reference: https://www.giac.org/paper/gsec/3873/information-warfare-cyber-warfare-future-warfare/106165 (14)
Your score is
The average score is 54%
Practice Again
More IT practice tests CLICK HERE
More IT practice tests
CLICK HERE