ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 16 )

Updated On: 15-Feb-2026

Which access control method is based on users issuing access requests on system resources, features assigned to those resources, the operational or situational context, and a set of policies specified in terms of those features and context?

  1. Mandatory Access Control (MAC)
  2. Attribute Based Access Control (ABAC)
  3. Role Based Access Control (RBAC)
  4. Discretionary Access Control (DAC)

Answer(s): B



What is a security concern when considering implementing software-defined networking (SDN)?

  1. It has a decentralized architecture.
  2. It increases the attack footprint.
  3. It uses open source protocols.
  4. It is cloud based.

Answer(s): B



What is the BEST way to restrict access to a file system on computing systems?

  1. Use least privilege at each level to restrict access.
  2. Restrict access to all users.
  3. Allow a user group to restrict access.
  4. Use a third-party tool to restrict access.

Answer(s): A



Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?

  1. Avoid lengthy audit reports
  2. Enable generation of corrective action reports
  3. Facilitate a root cause analysis (RCA)
  4. Lower costs throughout the System Development Life Cycle (SDLC)

Answer(s): C



What is the correct order of execution for security architecture?

  1. Governance, strategy and program management, operations, project delivery
  2. Governance, strategy and program management, project delivery, operations
  3. Strategy and program management, project delivery, governance, operations
  4. Strategy and program management, governance, project delivery, operations

Answer(s): B






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion