ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 22 )

Updated On: 19-Jan-2026

The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated?

  1. Data loss protection (DLP)
  2. Intrusion detection
  3. Vulnerability scanner
  4. Information Technology Asset Management (ITAM)

Answer(s): D



Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?

  1. Distributed denial-of-service (DDoS) attack
  2. Advanced persistent threat (APT) attempt
  3. Zero-day attack
  4. Phishing attempt

Answer(s): B



As a design principle, which one of the following actors is responsible for identifying and approving data security requirement in a cloud ecosystem?

  1. Cloud auditor
  2. Cloud broker
  3. Cloud provider
  4. Cloud consumer

Answer(s): D



Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's approved policies before being allowed on the network?

  1. Network Access Control (NAC)
  2. Privileged Access Management (PAM)
  3. Group Policy Object (GPO)
  4. Mobile Device Management (MDM)

Answer(s): A



Viewing page 22 of 122
Viewing questions 85 - 88 out of 484 questions



Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion