ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 18 )

Updated On: 19-Jan-2026

International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?

  1. International Traffic in Arms Regulations (ITAR)
  2. Palermo convention
  3. Wassenaar arrangement
  4. General Data Protection Regulation (GDPR)

Answer(s): C



An organization has implemented a protection strategy to secure the network from unauthorized external access. The new Chief Information Security Officer
(CISO) wants to increase security by better protecting the network from unauthorized internal access. Which Network Access Control (NAC) capability BEST meets this objective?

  1. Port security
  2. Two-factor authentication (2FA)
  3. Strong passwords
  4. Application firewall

Answer(s): A



Which section of the assessment report addresses separate vulnerabilities, weaknesses, and gaps?

  1. Findings definition section
  2. Risk review section
  3. Executive summary with full details
  4. Key findings section

Answer(s): D



Why is data classification control important to an organization?

  1. To enable data discovery
  2. To ensure security controls align with organizational risk appetite
  3. To ensure its integrity, confidentiality and availability
  4. To control data retention in alignment with organizational policies and regulation

Answer(s): B



Viewing page 18 of 122
Viewing questions 69 - 72 out of 484 questions



Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion