Search Header Logo

CISSP Domain 8

Authored by Miftah Rahman

Computers

Professional Development

Used 16+ times

CISSP Domain 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

When in the Software Development Life Cycle (SDLC) MUST software security functional requirements be defined?

After the system preliminary design has been developed and the data security categorization has been performed

the vulnerability analysis has been performed and before the system detailed design begins

After the system preliminary design has been developed and before the data security categorization begins

After the business functional analysis and the data security categorization have been performed

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is the BEST method to prevent malware from being introduced into a production environment?

Purchase software from a limited list of retailers

Verify the hash key or certificate key of all updates

Do not permit programs, patches, or updates from the Internet

Test all new software in a segregated environment

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

The configuration management and control task of the certification and accreditation process is incorporated in which phase of the System Development Life

Cycle (SDLC)?

System acquisition and development

System operations and maintenance

System initiation

System implementation

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What is the BEST approach to addressing security issues in legacy web applications?

Debug the security issues

Migrate to newer, supported applications where possible

Conduct a security assessment

Protect the legacy application with a web application firewall

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is a web application control that should be put into place to prevent exploitation of Operating System (OS) bugs?

Check arguments in function calls

Test for the security patch level of the environment

Include logging functions

Digitally sign each application module

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

An application developer is deciding on the amount of idle session time that the application allows before a timeout. The BEST reason for determining the session timeout requirement is

organization policy.

industry best practices.

industry laws and regulations.

management feedback.

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following best explains how an attacker could steal a user’s session cookie and perform session hijacking?

By injecting malicious JavaScript code into a vulnerable web page (Cross-Site Scripting) that sends the victim’s cookie to the attacker’s server.

By capturing unencrypted HTTP traffic on a public Wi-Fi network and extracting the session ID contained in the cookie.

By creating a fake login page (phishing site) that tricks the user into submitting their credentials and automatically sets a session cookie known to the attacker.

By using malware installed on the hacker’s device that reads browser-stored cookies directly from the local file system

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?