ISC2 CISSP Exam Questions
Certified Information Systems Security Professional (CISSP) (Page 18 )

Updated On: 15-Feb-2026

The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated?

  1. Data loss protection (DLP)
  2. Intrusion detection
  3. Vulnerability scanner
  4. Information Technology Asset Management (ITAM)

Answer(s): D



Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

  1. Distributed denial-of-service (DDoS) attack
  2. Advanced persistent threat (APT) attempt
  3. Zero-day attack
  4. Phishing attempt

Answer(s): B



As a design principle, which one of the following actors is responsible for identifying and approving data security requirement in a cloud ecosystem?

  1. Cloud auditor
  2. Cloud broker
  3. Cloud provider
  4. Cloud consumer

Answer(s): D



Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?

  1. Network Access Control (NAC)
  2. Privileged Access Management (PAM)
  3. Group Policy Object (GPO)
  4. Mobile Device Management (MDM)

Answer(s): A



Which one of the following BEST protects vendor accounts that are used for emergency maintenance?

  1. Vendor access should be disabled until needed
  2. Frequent monitoring of vendor access
  3. Role-based access control (RBAC)
  4. Encryption of routing tables

Answer(s): C






Post your Comments and Discuss ISC2 CISSP exam dumps with other Community members:

Join the CISSP Discussion