ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 5 )

Updated On: 12-Feb-2026

Which application type is considered high risk and provides a common way for malware and viruses to enter a network?

  1. Instant messaging or chat applications
  2. Peer-to-Peer (P2P) file sharing applications
  3. E-mail applications
  4. End-to-end applications

Answer(s): B



An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference architecture would mobile devices be tracked?

  1. 0
  2. 1
  3. 2
  4. 3

Answer(s): B



Which of the following is the BEST way to protect an organization's data assets?

  1. Encrypt data in transit and at rest using up-to-date cryptographic algorithms.
  2. Monitor and enforce adherence to security policies.
  3. Require Multi-Factor Authentication (MFA) and Separation of Duties (SoD).
  4. Create the Demilitarized Zone (DMZ) with proxies, firewalls and hardened bastion hosts.

Answer(s): A



Within a large organization, what business unit is BEST positioned to initiate provisioning and deprovisioning of user accounts?

  1. Training department
  2. Internal audit
  3. Human resources
  4. Information technology (IT)

Answer(s): C



Which of the following is the PRIMARY purpose of installing a mantrap within a facility?

  1. Control traffic
  2. Control air flow
  3. Prevent piggybacking
  4. Prevent rapid movement

Answer(s): C






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion