CISSP PRACTICE QUESTIONS – 20210301

Effective CISSP Questions

You have provisionally passed the CISSP exam and started the online endorsement application to earn the certification (as a privilege) and obtain your credential. To commit to fully supporting the (ISC)² Code of Ethics, you are exercising due diligence and reviewing the code online. Which of the following is not an ethics canon that you might violate?
A. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
B. Act honorably, honestly, justly, responsibly, and legally.
C. Provide diligent and competent service to principles.
D. Advance and protect the profession.

Continue reading

Top BSIMM Activities

  1. Ensure host and network security basics are in place
  2. Implement life cycle governance
  3. Review security features
  4. Use external penetration testers to find problems
  5. Identify personally identifiable information (PII) obligations
  6. Perform security feature review.
  7. Create or interface with incident response
  8. Ensure QA performs edge/boundary value condition testing
  9. Integrate and deliver security features
  10. Identify software defects found in operations monitoring and feed them back to development
  11. Use automated tools along with manual review
  12. Feed results to the defect management and mitigation system
  13. Feed results to the defect management and mitigation system

Source: https://www.bsimm.com/about.html

CISSP PRACTICE QUESTIONS – 20210226

Effective CISSP Questions

Your organization suffered from data compromise. A local hacker group was identified during the incident response process and regarded responsible based on collected evidence. If your organization decides to prosecute the hacker group, which of the following is most critical?
A. Timely e-discovery
B. Sound information governance
C. Compliance with CPTED principles
D. Effective administrative investigation

Continue reading

CISSP PRACTICE QUESTIONS – 20210225

Effective CISSP Questions

A subject is authenticating to the ID provider. Which of the following is not a cryptographic function or cipher and provides the lowest level of security in the authentication process?
A. Base64 for the encoding of ID and password in HTTP basic authentication
B. Electronic Codebook (ECB) that produces repeated patterns
C. Hash-based message authentication code (HMAC)
D. Cipher block chaining message authentication code (CBC-MAC)

Continue reading

CISSP-ISSEP Preparation

NIST SP 800-160 V1 and ISO 15288
NIST SP 800-160 V1 and ISO 15288

ISSEP is a concentration exam of CISSP. It is not that hard but intimidating because of the limited number of exam prep materials. The following official sources are crucial.

PRIMARY MATERIALS

  1. ISSEP Certification Exam Outline
  2. ISSEP CBK Suggested References

ISSEP CBK SUGGESTED REFERENCES

  • IATF is obsolete.
  • NIST SP 800-160 volumes 1 & 2
  • INCOSE System Engineering Handbook
  • NIST SP 800-37 (RMF)
  • NIST SP 800-161 (Supply Chain Risk Management)
  • PMI PMBOK (Free for PMI members)
  • The ISSEP CBK book is outdated but good to have

CISSP PRACTICE QUESTIONS – 20210224

Effective CISSP Questions

Your organization set up a new position, CISO, which reports to the CIO, to be in charge of cybersecurity. As the CISO, you aim to support the business effectively. Which of the following is the most critical task for you?
A. Integrate security into IT processes
B. Implement comprehensive network access control
C. Sponsor and direct the business continuity program
D. Develop an information security management system

Continue reading

CISSP PRACTICE QUESTIONS – 20210223

Effective CISSP Questions

You are applying for a certificate from a certificate authority (CA) to support the secure transmission on the E-Commerce website that serves global customers. Which of the following actions exposes the least risk?
A. Randomly generate an asymmetric key pair on the portal of the CA.
B. Use a utility to create the certificate request on the local workstation
C. Upload the key pair to the CA server for approval and signing
D. Download and install the certificate containing the key pair onto the webserver

Continue reading