ISC2 CISSP Exam Questions
Certified Information Systems Security Professional (CISSP) (Page 8 )

Updated On: 5-Mar-2026

Which of the following encryption technologies has the ability to function as a stream cipher?

  1. Cipher Block Chaining (CBC) with error propagation
  2. Electronic Code Book (ECB)
  3. Cipher Feedback (CFB)
  4. Feistel cipher

Answer(s): C



In a disaster recovery (DR) test, which of the following would be a trait of crisis management?

  1. Process
  2. Anticipate
  3. Strategic
  4. Wide focus

Answer(s): A



Which of the following BEST describes the purpose of the reference monitor when defining access control to enforce the security model?

  1. Strong operational security to keep unit members safe
  2. Policies to validate organization rules
  3. Cyber hygiene to ensure organizations can keep systems healthy
  4. Quality design principles to ensure quality by design

Answer(s): B



Which of the following is security control volatility?

  1. A reference to the impact of the security control.
  2. A reference to the likelihood of change in the security control.
  3. A reference to how unpredictable the security control is.
  4. A reference to the stability of the security control.

Answer(s): B



When auditing the Software Development Life Cycle (SDLC) which of the following is one of the high-level audit phases?

  1. Planning
  2. Risk assessment
  3. Due diligence
  4. Requirements

Answer(s): A



Viewing page 8 of 98
Viewing questions 36 - 40 out of 484 questions



Post your Comments and Discuss ISC2 CISSP exam dumps with other Community members:

CISSP Exam Discussions & Posts

AI Tutor