New VCE and PDF Exam Dumps from PassLeader ➢ Vendor: (ISC)2 ➢ Exam Code: CISSP ➢ Exam Name: Certified Information Systems Security Professional (CISSP) ➢ Version: 20.051 NEW QUESTION 1 Which of the following is the MOST important output from a mobile application threat modeling exercise according to Open Web Application Security Project (OWASP)? A. B. C. D. The likelihood and impact of a vulnerability. Application interface entry and endpoints. Countermeasures and mitigations for vulnerabilities. A data flow diagram for the application and attack surface analysis. Answer: D NEW QUESTION 2 Continuity of operations is BEST supported by which of the following? A. B. C. D. Confidentiality, availability, and reliability. Connectivity, reliability, and redundancy. Connectivity, reliability, and recovery. Confidentiality, integrity, and availability. Answer: B NEW QUESTION 3 What determines the level of security of a combination lock? A. B. C. D. Complexity of combination required to open the lock. Amount of time it takes to brute force the combination. The number of barrels associated with the internal mechanism. The hardness score of the metal lock material. Answer: A NEW QUESTION 4 Which of the following is a process in the access provisioning lifecycle that will MOST likely identify access aggregation issues? A. B. C. Test Assessment Review CISSP Exam Dumps CISSP Exam Questions CISSP PDF Dumps https://www.passleader.com/cissp.html CISSP VCE Dumps New VCE and PDF Exam Dumps from PassLeader D. Peer review Answer: C NEW QUESTION 5 For the purpose of classification, which of the following is used to divide trust domain and trust boundaries? A. B. C. D. Network Architecture Integrity Identity Management (IdM) Confidentiality Management Answer: A NEW QUESTION 6 Which of the following is MOST effective in detecting information hiding in TCP/IP traffic? A. B. C. D. Packet-filter firewall Content-filtering web proxy Stateful-inspection firewall Application-level firewall Answer: C NEW QUESTION 7 Which of the following techniques BEST prevents buffer overflows? A. B. C. D. Boundary and perimeter offset. Character set encoding. Code auditing. Variant type and bit length. Answer: B NEW QUESTION 8 What principle requires that changes to the plaintext affect many parts of the ciphertext? A. B. C. D. Encapsulation Permutation Diffusion Obfuscation Answer: C NEW QUESTION 9 Which of the following processes is used to align security controls with business functions? A. B. C. D. Data mapping Standards selection Scoping Tailoring Answer: B CISSP Exam Dumps CISSP Exam Questions CISSP PDF Dumps https://www.passleader.com/cissp.html CISSP VCE Dumps New VCE and PDF Exam Dumps from PassLeader NEW QUESTION 10 What is the best way for mutual authentication of devices belonging to the same organization? A. B. C. D. Token Certificates User ID and passwords Biometric Answer: A NEW QUESTION 11 Which of the following offers the BEST security functionality for transmitting authentication tokens? A. B. C. D. JavaScript Object Notation (JSON) Terminal Access Controller Access Control System (TACACS) Security Assertion Markup Language (SAML) Remote Authentication Dial-In User Service (RADIUS) Answer: C NEW QUESTION 12 What is the MAIN purpose for writing planned procedures in the design of Business Continuity Plans (BCP)? A. B. C. D. Establish lines of responsibility. Minimize the risk of failure. Accelerate the recovery process. Eliminate unnecessary decision making. Answer: B NEW QUESTION 13 What is the foundation of cryptographic functions? A. B. C. D. Cipher Encryption Hash Entropy Answer: A NEW QUESTION 14 What information will BEST assist security and financial analysts in determining if a security control is cost effective to mitigate a vulnerability? A. B. C. D. Annualized Loss Expectancy (ALE) and the cost of the control. Single Loss Expectancy (SLE) and the cost of the control. Annual Rate of Occurrence (ARO) and the cost of the control. Exposure Factor (EF) and the cost of the control. Answer: D NEW QUESTION 15 Which step of the Risk Management Framework (RMF) identifies the initial set of baseline security controls? CISSP Exam Dumps CISSP Exam Questions CISSP PDF Dumps https://www.passleader.com/cissp.html CISSP VCE Dumps New VCE and PDF Exam Dumps from PassLeader A. B. C. D. Selection Monitoring Implementation Assessment Answer: A NEW QUESTION 16 A security team member was selected as a member of a Change Control Board (CCB) for an organization. Which of the following is one of their responsibilities? A. B. C. D. Approving or disapproving the change. Determining the impact of the change. Carrying out the requested change. Logging the change. Answer: B NEW QUESTION 17 Which action is MOST effective for controlling risk and minimizing maintenance costs in the software supply chain? A. B. C. D. Selecting redundant suppliers. Selecting suppliers based on business requirements. Selecting fewer, more reliable suppliers. Selecting software suppliers with the fewest known vulnerabilities. Answer: D NEW QUESTION 18 A data owner determines the appropriate job-based access for an employee to perform their duties. Which type of access control is this? A. B. C. D. Discretionary Access Control (DAC) Non-discretionary access control Mandatory Access Control (MAC) Role-based access control (RBAC) Answer: D NEW QUESTION 19 The process of "salting" a password is designed to increase the difficulty of cracking which of the following? A. B. C. D. Specific password Password hash function Password algorithm Maximum password length Answer: B NEW QUESTION 20 Which of the following does Secure Sockets Layer (SSL) encryption protect? CISSP Exam Dumps CISSP Exam Questions CISSP PDF Dumps https://www.passleader.com/cissp.html CISSP VCE Dumps New VCE and PDF Exam Dumps from PassLeader A. B. C. D. Data availability Data at rest Data in transit Data integrity Answer: C NEW QUESTION 21 Which of the following is a credible source to validate that security testing of Commercial Off-TheShelf (COTS) software has been performed with international standards? A. B. C. D. Common Criteria (CC) Evaluation Assurance Level (EAL) National Information Assurance Partnership (NIAP) International Standards Organization (ISO) Answer: A NEW QUESTION 22 A security engineer is tasked with implementing a new identity solution. The client doesn't want to install or maintain the infrastructure. Which of the following would qualify as the BEST solution? A. B. C. D. Microsoft Identity Manager (MIM) Azure Active Directory (AD) Active Directory Federation Services (ADFS) Active Directory (AD) Answer: D NEW QUESTION 23 Which of the following is the FIRST thing to consider when reviewing Information Technology (IT) internal controls? A. B. C. D. The risk culture of the organization. The impact of the control. The nature of the risk. The cost of the control. Answer: B NEW QUESTION 24 Which layer of the Open System Interconnection (OSI) model is reliant on other layers and is concerned with the structure, interpretation and handling of information? A. B. C. D. Presentation Layer Session Layer Application Layer Transport Layer Answer: D NEW QUESTION 25 When conveying the results of a security assessment, which of the following is the PRIMARY audience? CISSP Exam Dumps CISSP Exam Questions CISSP PDF Dumps https://www.passleader.com/cissp.html CISSP VCE Dumps New VCE and PDF Exam Dumps from PassLeader A. B. C. D. Information System Security Officer (ISSO) Authorizing Official (AO) Information System Security Manager (ISSM) Security Control Assessor (SCA) Answer: C NEW QUESTION 26 Which concept might require users to use a second access token or to re-enter passwords to gain elevated access rights in the identity and access provisioning life cycle? A. B. C. D. Time-based Enrollment Least privilege Access review Answer: B NEW QUESTION 27 Why are mobile devices sometimes difficult to investigate in a forensic examination? A. B. C. D. There are no forensics tools available for examination. They may contain cryptographic protection. They have password-based security at logon. They may have proprietary software installed to protect them. Answer: D NEW QUESTION 28 Which of the following global privacy legislation principles ensures that data handling policies and the name of the data controller are easily accessible to the public? A. B. C. D. Use limitation Openness Purpose specification Individual participation Answer: B NEW QUESTION 29 Security categorization of a new system takes place during which phase of the Systems Development Life Cycle (SDLC)? A. B. C. D. System implementation System initiation System operations and maintenance System acquisition and development Answer: D NEW QUESTION 30 What is the motivation for use of the Online Certificate Status Protocol (OCSP)? A. B. To return information on multiple certificates. To control access to Certificate Revocation List (CRL) requests. CISSP Exam Dumps CISSP Exam Questions CISSP PDF Dumps https://www.passleader.com/cissp.html CISSP VCE Dumps New VCE and PDF Exam Dumps from PassLeader C. D. To provide timely up-to-date responses to certificate queries. To issue X.509v3 certificates more quickly. Answer: D NEW QUESTION 31 ...... Visit PassLeader and Download Full Version CISSP Exam Dumps CISSP Exam Dumps CISSP Exam Questions CISSP PDF Dumps https://www.passleader.com/cissp.html CISSP VCE Dumps