1 / 90

CISSP Exam Questions 2020 | CISSP Exam Preparation | CISSP Training Video 2020 | Simplilearn

In this presentaion, we will look into the CISSP certification and the type of questions that appear in the CISSP Exam. The CISSP exam is one of the toughest in the field of cyber security. This video will help you gain an overview of this exam, the various domains in CISSP, and the different types of questions that can be asked under each of these domains. <br><br>The Certified Information Systems Security Professional (CISSP) is a globally recognized certification for information technology security professionals. Aligned with (ISC)u00b2 CBK 2018, our CISSP training covers all areas of IT security so you can become a strong information security professional.<br><br>CISSP Certification Course Overview:<br>The CISSP certification training develops your expertise in defining the IT architecture and in designing, building, and maintaining a secure business environment using globally approved information security standards. The course covers industry best practices and prepares you for the CISSP certification exam held by (ISC)u00b2.<br><br>CISSP Training Key Features:<br>- 67 hours of in-depth learning<br>- 5 simulation test papers to prepare you for CISSP certification<br>- Offers the requisite 30 CPEs for taking the CISSP examination<br><br>Eligibility:<br>The CISSP certification is the most globally recognized professional requirement in the IT Security domain. This CISSP training is best suited for those at the intermediate level of their career including; security consultants/managers, IT directors/managers, security auditors/architects, security system engineers, CIOs, and network architects.<br><br>Pre-requisites:<br>To obtain your CISSP certification, you must have a minimum of five years of full-time professional work experience in two or more of the 8 domains of the CISSP u2013 (ISC)u00b2 CBK 2018. A qualified individual with less than five years of experience will receive the (ISC)u00b2 associate title.<br><br>Learn more at https://www.simplilearn.com/cyber-security/cissp-certification-training<br>

Simplilearn
Download Presentation

CISSP Exam Questions 2020 | CISSP Exam Preparation | CISSP Training Video 2020 | Simplilearn

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Questions

  2. What’s in it for you? • What is CISSP exam? • CISSP exam overview • Domains in CISSP • What to study and sample questions?

  3. What is CISSP?

  4. Questions Click here to watch the video

  5. What is CISSP exam? CISSP is considered the gold standard in the field of information security

  6. What is CISSP exam? This certifications expires after 3 years. You must provide professional certificate to retain the certification CISSP is considered the gold standard in the field of information security

  7. What is CISSP exam? This certifications expires after 3 years. You must provide professional certificate to retain the certification CISSP is considered the gold standard in the field of information security The passing rate of this exam is less than 50%

  8. What is CISSP exam? This certifications expires after 3 years. You must provide professional certificate to retain the certification CISSP is considered the gold standard in the field of information security To register for the exam, you must possess a minimum of five years of professional experience in the information security field The passing rate of this exam is less than 50%

  9. Exam overview

  10. CISSP exam overview Following are the features of CISSP exam Governing body

  11. CISSP exam overview Following are the features of CISSP exam Governing body • 4 years college degree or additional credential from (ISC)2 approved list that will satisfy 1 year of required experience. • 5 years of paid full time work experience in 2 or more domains Professional experience

  12. CISSP exam overview Following are the features of CISSP exam Exam fees $699 USD : Maintenance fees $85 USD for 3 years : Exam length 3 hours : Number of questions 100 - 150 :

  13. CISSP exam overview Following are the features of CISSP exam 700 out of 1000 points Passing score : English Exam language : (ISC)2 authorized centres Testing centre : Question format Multiple choice :

  14. CISSP exam overview CISSP exam weightage

  15. Domains in CISSP

  16. + Domains in CISSP Asset security Security and risk management Security architecture and engineering Software development security Communication and network security Security operations Security assessment and testing Identity and access management

  17. What to study and sample questions

  18. + Domain wise topics and questions Security and risk management Asset security Security architecture and engineering Software development security Communication and network security Security operations Security assessment and testing Identity and access management

  19. 1. Security and risk management - Questions This is the largest domain in CISSP. This domain teaches you all the details about information systems management

  20. 1. Security and risk management - Questions This is the largest domain in CISSP. This domain teaches you all the details about information systems management

  21. 1. Security and risk management - Questions • 1 The primary goal of the security awareness program is: To provide a platform for disclosing exposure and risk analysis To make everyone aware of potential risk and exposure A way of communicating security procedures To provide accurate risk and exposure results

  22. 1. Security and risk management - Questions • 1 The primary goal of the security awareness program is: To provide a platform for disclosing exposure and risk analysis To make everyone aware of potential risk and exposure A way of communicating security procedures To provide accurate risk and exposure results

  23. 1. Security and risk management - Questions • 2 A contingency plan should address which of the following? Potential risks Residual risks All the above Identified risks

  24. 1. Security and risk management - Questions • 2 A contingency plan should address which of the following? Potential risks Residual risks All the above Identified risks

  25. 1. Security and risk management - Questions • 3 When the cost of the countermeasures outweighs the cost of the risk, the best way to handle the risk is to: Reject the risk Transfer the risk Reduce the risk Accept the risk

  26. 1. Security and risk management - Questions • 3 When the cost of the countermeasures outweighs the cost of the risk, the best way to handle the risk is to: Reject the risk Transfer the risk Reduce the risk Accept the risk

  27. + Domain wise topics and questions Asset security Security and risk management Security architecture and engineering Software development security Communication and network security Security operations Security assessment and testing Identity and access management

  28. 2. Asset security - Questions Asset security domain consists of topics about the physical requirements of information security

  29. 2. Asset security - Questions Please explain the topics using this link Asset security domain consists of topics about the physical requirements of information security https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx

  30. 2. Asset security - Questions • 1 Which of the following is responsible for setting user clearances to computer-based information? Operators Data owners Data custodians Security administrators

  31. 2. Asset security - Questions • 1 Which of the following is responsible for setting user clearances to computer-based information? Operators Data owners Data custodians Security administrators

  32. 2. Asset security - Questions • 2 What is generally concerned with personal security? Management controls Operational controls Human resource controls Technical controls

  33. 2. Asset security - Questions • 2 What is generally concerned with personal security? Management controls Operational controls Human resource controls Technical controls

  34. 2. Asset security - Questions • 3 Which of the following factors determines the frequency of information security audits in any given environment? Asset value Management discretion Level of realized threats Risk

  35. 2. Asset security - Questions • 3 Which of the following factors determines the frequency of information security audits in any given environment? Asset value Management discretion Level of realized threats Risk

  36. + Domain wise topics and questions Asset security Security and risk management Software development security Security architecture and engineering Communication and network security Security operations Security assessment and testing Identity and access management https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx

  37. 3. Security architecture and engineering - Questions Security architecture domain consists of several important topics of information security such as cryptography, assessing vulnerabilities, etc.

  38. 3. Security architecture and engineering - Questions Please explain the topics using this link Security architecture domain consists of several important topics of information security such as cryptography, assessing vulnerabilities, etc. https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx

  39. 3. Security architecture and engineering - Questions • 1 When a computer uses more than one CPU in parallel to execute instructions, it is known as ________ Multiprocessing Multitasking Parallel running Multithreading

  40. 3. Security architecture and engineering - Questions • 1 When a computer uses more than one CPU in parallel to execute instructions, it is known as ________ Multiprocessing Multitasking Parallel running Multithreading

  41. 3. Security architecture and engineering - Questions • 2 • Who mediates all access relationships between subjects and objects of a system? Firewall Reference kernel Information flow model Security kernel

  42. 3. Security architecture and engineering - Questions • 2 • Who mediates all access relationships between subjects and objects of a system? Firewall Reference kernel Information flow model Security kernel

  43. 3. Security architecture and engineering - Questions • 3 • Which of the following is not a spam blocking architecture? Email-server based Client based Mail blocking service Application based

  44. 3. Security architecture and engineering - Questions • 3 • Which of the following is not a spam blocking architecture? Email-server based Client based Mail blocking service Application based

  45. + Domain wise topics and questions Asset security Security and risk management Security architecture and engineering Software development security Communication and network security Security operations Security assessment and testing Identity and access management https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx

  46. 4. Communication and network security - Questions The network security domain covers topics focussed on protecting the network of the organization

  47. 4. Communication and network security - Questions Please explain the topics using this link The network security domain covers topics focussed on protecting the network of the organization https://www.isc2.org/-/media/ISC2/Certifications/Exam-Outlines/CISSP-Exam-Outline-121417--Final.ashx

  48. 4. Communication and network security - Questions • 1 • What is the purpose of using a virtual private network (VPN) Secure remote access into a network Securely connect two networks together All the above Secure data tunnel within a network

  49. 4. Communication and network security - Questions • 1 • What is the purpose of using a virtual private network (VPN) Secure remote access into a network Securely connect two networks together All the above Secure data tunnel within a network

  50. 4. Communication and network security - Questions • 2 • Which of the following characteristics are not included in the TCP protocol? Connection Sequencing Connection less Flow control

More Related