ISC2 CISSP Exam
Certified Information Systems Security Professional (CISSP) (Page 8 )

Updated On: 12-Feb-2026

Which of the following encryption technologies has the ability to function as a stream cipher?

  1. Cipher Block Chaining (CBC) with error propagation
  2. Electronic Code Book (ECB)
  3. Cipher Feedback (CFB)
  4. Feistel cipher

Answer(s): C



In a disaster recovery (DR) test, which of the following would be a trait of crisis management?

  1. Process
  2. Anticipate
  3. Strategic
  4. Wide focus

Answer(s): A



Which of the following BEST describes the purpose of the reference monitor when defining access control to enforce the security model?

  1. Strong operational security to keep unit members safe
  2. Policies to validate organization rules
  3. Cyber hygiene to ensure organizations can keep systems healthy
  4. Quality design principles to ensure quality by design

Answer(s): B



Which of the following is security control volatility?

  1. A reference to the impact of the security control.
  2. A reference to the likelihood of change in the security control.
  3. A reference to how unpredictable the security control is.
  4. A reference to the stability of the security control.

Answer(s): B



When auditing the Software Development Life Cycle (SDLC) which of the following is one of the high-level audit phases?

  1. Planning
  2. Risk assessment
  3. Due diligence
  4. Requirements

Answer(s): A






Post your Comments and Discuss ISC2 CISSP exam prep with other Community members:

Join the CISSP Discussion