ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 14 )

Updated On: 15-Feb-2026

What is the MOST significant benefit of role-based access control (RBAC)?

  1. Reduces inappropriate access
  2. Management of least privilege
  3. Most granular form of access control
  4. Reduction in authorization administration overhead

Answer(s): B



What is the MOST common security risk of a mobile device?

  1. Data spoofing
  2. Malware infection
  3. Insecure communications link
  4. Data leakage

Answer(s): D



What level of Redundant Array of Independent Disks (RAID) is configured PRIMARILY for high-performance data reads and writes?

  1. RAID-0
  2. RAID-1
  3. RAID-5
  4. RAID-6

Answer(s): A



What type of risk is related to the sequences of value-adding and managerial activities undertaken in an organization?

  1. Control risk
  2. Demand risk
  3. Supply risk
  4. Process risk

Answer(s): D



International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?

  1. International Traffic in Arms Regulations (ITAR)
  2. Palermo convention
  3. Wassenaar arrangement
  4. General Data Protection Regulation (GDPR)

Answer(s): C






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion