ISC2 CISSP Exam Questions
Certified Information Systems Security Professional (CISSP) (Page 19 )

Updated On: 16-Feb-2026

Which event magnitude is defined as deadly, destructive, and disruptive when a hazard interacts with human vulnerability?

  1. Crisis
  2. Catastrophe
  3. Accident
  4. Disaster

Answer(s): B



Which of the following BEST describes the purpose of software forensics?

  1. To analyze possible malicious intent of malware
  2. To perform cyclic redundancy check (CRC) verification and detect changed applications
  3. To determine the author and behavior of the code
  4. To review program code to determine the existence of backdoors

Answer(s): C



A web developer is completing a new web application security checklist before releasing the application to production. The task of disabling unnecessary services is on the checklist. Which web application threat is being mitigated by this action?

  1. Session hijacking
  2. Security misconfiguration
  3. Broken access control
  4. Sensitive data exposure

Answer(s): B



What is the BEST method to use for assessing the security impact of acquired software?

  1. Threat modeling
  2. Common vulnerability review
  3. Software security compliance validation
  4. Vendor assessment

Answer(s): A



Which of the following ensures old log data is not overwritten?

  1. Log retention
  2. Implement Syslog
  3. Increase log file size
  4. Log preservation

Answer(s): A






Post your Comments and Discuss ISC2 CISSP exam dumps with other Community members:

Join the CISSP Discussion