ISC2 CISSP Exam Questions
Certified Information Systems Security Professional (CISSP) (Page 14 )

Updated On: 5-Mar-2026

What is the MOST significant benefit of role-based access control (RBAC)?

  1. Reduces inappropriate access
  2. Management of least privilege
  3. Most granular form of access control
  4. Reduction in authorization administration overhead

Answer(s): B



What is the MOST common security risk of a mobile device?

  1. Data spoofing
  2. Malware infection
  3. Insecure communications link
  4. Data leakage

Answer(s): D



What level of Redundant Array of Independent Disks (RAID) is configured PRIMARILY for high-performance data reads and writes?

  1. RAID-0
  2. RAID-1
  3. RAID-5
  4. RAID-6

Answer(s): A



What type of risk is related to the sequences of value-adding and managerial activities undertaken in an organization?

  1. Control risk
  2. Demand risk
  3. Supply risk
  4. Process risk

Answer(s): D



International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?

  1. International Traffic in Arms Regulations (ITAR)
  2. Palermo convention
  3. Wassenaar arrangement
  4. General Data Protection Regulation (GDPR)

Answer(s): C



Viewing page 14 of 98
Viewing questions 66 - 70 out of 484 questions



Post your Comments and Discuss ISC2 CISSP exam dumps with other Community members:

CISSP Exam Discussions & Posts

AI Tutor