CISSP Exam - Free Actual Q&as, Page 1 - 100
CISSP Exam - Free Actual Q&as, Page 1 - 100
CISSP Exam - Free Actual Q&as, Page 1 - 100
Question #1 Topic 1
Physical assets defined in an organization's business impact analysis (BIA) could include which of the following?
C. Cloud-based applications
Correct Answer: D
Question #2 Topic 1
When assessing the audit capability of an application, which of the following activities is MOST important?
D. Review security plan for actions to be taken in the event of audit failure.
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 1/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #3 Topic 1
An organization would like to implement an authorization mechanism that would simplify the assignment of various system access permissions
for many users with similar job responsibilities. Which type of authorization mechanism would be the BEST choice for the organization to
implement?
Correct Answer: A
Question #4 Topic 1
What is the PRIMARY reason for criminal law being difficult to enforce when dealing with cybercrime?
Correct Answer: A
Question #5 Topic 1
Wi-Fi Protected Access 2 (WPA2) provides users with a higher level of assurance that their data will remain protected by using which protocol?
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 2/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #6 Topic 1
Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing
system?
A. Reference monitor
C. Time separation
D. Security kernel
Correct Answer: A
Question #7 Topic 1
What process facilitates the balance of operational and economic costs of protective measures with gains in mission capability?
A. Performance testing
B. Risk assessment
C. Security audit
D. Risk management
Correct Answer: D
Question #8 Topic 1
Clothing retailer employees are provisioned with user accounts that provide access to resources at partner businesses. All partner businesses use
common identity and access management (IAM) protocols and differing technologies. Under the Extended Identity principle, what is the process
A. Clothing retailer acts as User Self Service, confirms identity of user using industry standards, then sends credentials to partner businesses
B. Clothing retailer acts as identity provider (IdP), confirms identity of user using industry standards, then sends credentials to partner
C. Clothing retailer acts as Service Provider, confirms identity of user using industry standards, then sends credentials to partner businesses
D. Clothing retailer acts as Access Control Provider, confirms access of user using industry standards, then sends credentials to partner
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 3/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Question #9 Topic 1
Which of the following statements BEST describes least privilege principle in a cloud environment?
Correct Answer: D
An organization has been collecting a large amount of redundant and unusable data and filling up the storage area network (SAN). Management
has requested the identification of a solution that will address ongoing storage problems. Which is the BEST technical solution?
A. Compression
B. Caching
C. Replication
D. Deduplication
Correct Answer: A
Which Wide Area Network (WAN) technology requires the first router in the path to determine the full path the packet will travel, removing the need
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 4/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
C. Audit Logs
Correct Answer: A
Correct Answer: D
A company is enrolled in a hard drive reuse program where decommissioned equipment is sold back to the vendor when it is no longer needed.
The vendor pays more money for functioning drives than equipment that is no longer operational. Which method of data sanitization would
provide the most secure means of preventing unauthorized data loss, while also receiving the most money from the vendor?
A. Pinning
B. Single-pass wipe
C. Multi-pass wipes
D. Degaussing
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 5/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
When reviewing vendor certifications for handling and processing of company data, which of the following is the BEST Service Organization
A. SOC 1 Type 1
B. SOC 2 Type 1
C. SOC 2 Type 2
D. SOC 3
Correct Answer: C
Which application type is considered high risk and provides a common way for malware and viruses to enter a network?
C. E-mail applications
D. End-to-end applications
Correct Answer: B
An organization is looking to include mobile devices in its asset management system for better tracking. In which system tier of the reference
A. 0
B. 1
C. 2
D. 3
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 6/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following is the BEST way to protect an organization's data assets?
D. Create the Demilitarized Zone (DMZ) with proxies, firewalls and hardened bastion hosts.
Correct Answer: A
Within a large organization, what business unit is BEST positioned to initiate provisioning and deprovisioning of user accounts?
A. Training department
B. Internal audit
C. Human resources
Correct Answer: C
Which of the following is the PRIMARY purpose of installing a mantrap within a facility?
A. Control traffic
C. Prevent piggybacking
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 7/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
In the "Do" phase of the Plan-Do-Check-Act model, which of the following is performed?
A. Maintain and improve the Business Continuity Management (BCM) system by taking corrective action, based on the results of management
review.
B. Monitor and review performance against business continuity policy and objectives, report the results to management for review, and
C. Ensure the business continuity policy, controls, processes, and procedures have been implemented.
D. Ensure that business continuity policy, objectives, targets, controls, processes and procedures relevant to improving business continuity
Correct Answer: C
What industry-recognized document could be used as a baseline reference that is related to data security and business operations or conducting
a security assessment?
Correct Answer: D
A criminal organization is planning an attack on a government network. Which of the following scenarios presents the HIGHEST risk to the
organization?
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 8/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which reporting type requires a service organization to describe its system and define its control objectives and controls that are relevant to
Correct Answer: B
Which of the following is the BEST method to validate secure coding techniques against injection and overflow attacks?
A. Scheduled team review of coding style and techniques for vulnerability patterns
B. The regular use of production code routines from similar applications already in use
C. Using automated programs to test for the latest known vulnerability patterns
D. Ensure code editing tools are updated against known vulnerability patterns
Correct Answer: C
When resolving ethical conflicts, the information security professional MUST consider many factors. In what order should the considerations be
prioritized?
A. Public safety, duties to individuals, duties to the profession, and duties to principals
B. Public safety, duties to principals, duties to the profession, and duties to individuals
C. Public safety, duties to principals, duties to individuals, and duties to the profession
D. Public safety, duties to the profession, duties to principals, and duties to individuals
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 9/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which service management process BEST helps information technology (IT) organizations with reducing cost, mitigating risk, and improving
customer service?
A. Kanban
Correct Answer: D
A company is attempting to enhance the security of its user authentication processes. After evaluating several options, the company has decided
to utilize Identity as a Service (IDaaS). Which of the following factors leads the company to choose an IDaaS as their solution?
C. Third-party solutions are known for transferring the risk to the vendor.
Correct Answer: A
An organization recently suffered from a web-application attack that resulted in stolen user session cookie information. The attacker was able to
obtain the information when a user's browser executed a script upon visiting a compromised website. What type of attack MOST likely occurred?
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 10/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
An attack utilizing social engineering and a malicious Uniform Resource Locator (URL) link to take advantage of a victim's existing browser
session with a web application is an example of which of the following types of attack?
A. Clickjacking
D. Injection
Correct Answer: C
Which of the following encryption technologies has the ability to function as a stream cipher?
D. Feistel cipher
Correct Answer: C
In a disaster recovery (DR) test, which of the following would be a trait of crisis management?
A. Process
B. Anticipate
C. Strategic
D. Wide focus
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 11/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following BEST describes the purpose of the reference monitor when defining access control to enforce the security model?
Correct Answer: B
Correct Answer: C
When auditing the Software Development Life Cycle (SDLC) which of the following is one of the high-level audit phases?
A. Planning
B. Risk assessment
C. Due diligence
D. Requirements
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 12/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
What is the term used to define where data is geographically stored in the cloud?
B. Data sovereignty
C. Data warehouse
Correct Answer: B
Which of the following does the security design process ensure within the System Development Life Cycle (SDLC)?
A. Proper security controls, security objectives, and security goals are properly initiated.
B. Security objectives, security goals, and system test are properly conducted.
C. Proper security controls, security goals, and fault mitigation are properly conducted.
D. Security goals, proper security controls, and validation are properly initiated.
Correct Answer: D
Which of the following is MOST important to follow when developing information security controls for an organization?
A. Use industry standard best practices for security controls in the organization.
B. Exercise due diligence with regard to all risk management information to tailor appropriate controls.
C. Review all local and international standards and choose the most stringent based on location.
D. Perform a risk assessment and choose a standard that addresses existing gaps.
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 13/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
When recovering from an outage, what is the Recovery Point Objective (RPO), in terms of data recovery?
B. The RPO is the amount of time it takes to recover an acceptable percentage of data lost.
D. The RPO is the maximum amount of time for which loss of data is acceptable.
Correct Answer: D
Which of the following attacks, if successful, could give an intruder complete control of a software-defined networking (SDN) architecture?
A. A brute force password attack on the Secure Shell (SSH) port of the controller
B. Sending control messages to open a flow that does not pass a firewall from a compromised host within the network
Correct Answer: B
Which of the following is the BEST option to reduce the network attack surface of a system?
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 14/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
The security architect is designing and implementing an internal certification authority to generate digital certificates for all employees. Which of
Correct Answer: B
The existence of physical barriers, card and personal identification number (PIN) access systems, cameras, alarms, and security guards BEST
A. Access control
C. Defense-in-depth
D. Security perimeter
Correct Answer: D
A hospital enforces the Code of Fair Information Practices. What practice applies to a patient requesting their medical records from a web portal?
A. Purpose specification
B. Collection limitation
C. Use limitation
D. Individual participation
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 15/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
A colleague who recently left the organization asked a security professional for a copy of the organization's confidential incident management
A. Access the policy on a company-issued device and let the former colleague view the screen.
B. E-mail the policy to the colleague as they were already part of the organization and familiar with it.
C. Do not acknowledge receiving the request from the former colleague and ignore them.
D. Submit the request using company official channels to ensure the policy is okay to distribute.
Correct Answer: C
Which of the following BEST describes when an organization should conduct a black box security audit on a new software protect?
B. When the organization wants to enumerate known security vulnerabilities across their infrastructure
Correct Answer: C
In software development, which of the following entities normally signs the code to protect the code integrity?
C. The developer
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 16/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following technologies can be used to monitor and dynamically respond to potential threats on web applications?
A. Field-level tokenization
Correct Answer: B
A security architect is developing an information system for a client. One of the requirements is to deliver a platform that mitigates against
common vulnerabilities and attacks. What is the MOST efficient option used to prevent buffer overflow attacks?
B. Process isolation
D. Processor states
Correct Answer: C
In a quarterly system access review, an active privileged account was discovered that did not exist in the prior review on the production system.
The account was created one hour after the previous access review. Which of the following is the BEST option to reduce overall risk in addition to
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 17/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
A corporation does not have a formal data destruction policy. During which phase of a criminal legal proceeding will this have the MOST impact?
A. Sentencing
B. Trial
C. Discovery
D. Arraignment
Correct Answer: C
What is considered the BEST explanation when determining whether to provide remote network access to a third-party security service?
A. Contract negotiation
B. Supplier request
C. Business need
D. Vendor demonstration
Correct Answer: A
The acquisition of personal data being obtained by a lawful and fair means is an example of what principle?
B. Openness Principle
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 18/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following is the MOST appropriate control for asset data labeling procedures?
Correct Answer: A
What is the BEST approach to anonymizing personally identifiable information (PII) in a test environment?
A. Swapping data
B. Randomizing data
C. Encoding data
D. Encrypting data
Correct Answer: D
Which of the following departments initiates the request, approval, and provisioning business process?
A. Operations
B. Security
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 19/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
An organization is setting a security assessment scope with the goal of developing a Security Management Program (SMP). The next step is to
select an approach for conducting the risk assessment. Which of the following approaches is MOST effective for the SMP?
Correct Answer: D
Which technique helps system designers consider potential security concerns of their systems and applications?
A. Threat modeling
D. Penetration testing
Correct Answer: A
A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of
A. Network segmentation
B. Blacklisting application
C. Whitelisting application
D. Hardened configuration
Correct Answer: D
https://www.examtopics.com/exams/isc/cissp/custom-view/ 20/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Service providers perform as both the credential and identity provider (IdP).
C. Service providers agree to integrate identity system recognition across organizational boundaries.
D. Service providers rely on a trusted third party (TTP) to provide requestors with both credentials and identifiers.
Correct Answer: C
Correct Answer: D
A. Data spoofing
B. Malware infection
D. Data leakage
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 21/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
What level of Redundant Array of Independent Disks (RAID) is configured PRIMARILY for high-performance data reads and writes?
A. RAID-0
B. RAID-1
C. RAID-5
D. RAID-6
Correct Answer: A
What type of risk is related to the sequences of value-adding and managerial activities undertaken in an organization?
A. Control risk
B. Demand risk
C. Supply risk
D. Process risk
Correct Answer: D
International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber
weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of
the following?
B. Palermo convention
C. Wassenaar arrangement
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 22/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
An organization has implemented a protection strategy to secure the network from unauthorized external access. The new Chief Information
Security Officer
(CISO) wants to increase security by better protecting the network from unauthorized internal access. Which Network Access Control (NAC)
A. Port security
C. Strong passwords
D. Application firewall
Correct Answer: B
Which section of the assessment report addresses separate vulnerabilities, weaknesses, and gaps?
Correct Answer: D
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 23/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
To monitor the security of buried data lines inside the perimeter of a facility, which of the following is the MOST effective control?
A. Fencing around the facility with closed-circuit television (CCTV) cameras at all entry points
B. Ground sensors installed and reporting to a security event management (SEM) system
C. Regular sweeps of the perimeter, including manual inspection of the cable ingress points
Correct Answer: C
An enterprise is developing a baseline cybersecurity standard its suppliers must meet before being awarded a contract. Which of the following
Correct Answer: B
Which access control method is based on users issuing access requests on system resources, features assigned to those resources, the
operational or situational context, and a set of policies specified in terms of those features and context?
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 24/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
D. It is cloud based.
Correct Answer: B
What is the BEST way to restrict access to a file system on computing systems?
Correct Answer: A
Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 25/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Correct Answer: C
An international organization has decided to use a Software as a Service (SaaS) solution to support its business operations. Which of the
following compliance standards should the organization use to assess the international code security and data privacy of the solution?
Correct Answer: B
An authentication system that uses challenge and response was recently implemented on an organization's network, because the organization
conducted an annual penetration test showing that testers were able to move laterally using authenticated credentials. Which attack method was
A. Hash collision
C. Brute force
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 26/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following would qualify as an exception to the "right to be forgotten" of the General Data Protection Regulation (GDPR)?
D. The personal data remains necessary to the purpose for which it was collected
Correct Answer: A
A. Attack
B. Reporting
C. Planning
D. Discovery
Correct Answer: D
Which of the following is performed to determine a measure of success of a security awareness training program designed to prevent social
engineering attacks?
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 27/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the
B. Intrusion detection
C. Vulnerability scanner
Correct Answer: D
Which of the following threats would be MOST likely mitigated by monitoring assets containing open source libraries for vulnerabilities?
C. Zero-day attack
D. Phishing attempt
Correct Answer: C
As a design principle, which one of the following actors is responsible for identifying and approving data security requirement in a cloud
ecosystem?
A. Cloud auditor
B. Cloud broker
C. Cloud provider
D. Cloud consumer
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 28/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which of the following is the MOST effective way to ensure the endpoint devices used by remote users are compliant with an organization's
Correct Answer: A
Which one of the following BEST protects vendor accounts that are used for emergency maintenance?
Correct Answer: C
Which event magnitude is defined as deadly, destructive, and disruptive when a hazard interacts with human vulnerability?
A. Crisis
B. Catastrophe
C. Accident
D. Disaster
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 29/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
B. To perform cyclic redundancy check (CRC) verification and detect changed applications
Correct Answer: C
A web developer is completing a new web application security checklist before releasing the application to production. The task of disabling
unnecessary services is on the checklist. Which web application threat is being mitigated by this action?
A. Session hijacking
B. Security misconfiguration
Correct Answer: B
What is the BEST method to use for assessing the security impact of acquired software?
A. Threat modeling
D. Vendor assessment
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 30/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
A. Log retention
B. Implement Syslog
D. Log preservation
Correct Answer: C
Under the General Data Protection Regulation (GDPR), what is the maximum amount of time allowed for reporting a personal data breach?
A. 24 hours
B. 48 hours
C. 72 hours
D. 96 hours
Correct Answer: C
A financial organization that works according to agile principles has developed a new application for their external customer base to request a line
of credit. A security analyst has been asked to assess the security risk of the minimum viable product (MVP). Which is the MOST important
A. The software has been signed off for release by the product owner.
Correct Answer: D
https://www.examtopics.com/exams/isc/cissp/custom-view/ 31/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
An application developer receives a report back from the security team showing their automated tools were able to successfully enter unexpected
data into the organization's customer service portal, causing the site to crash. This is an example of which type of testing?
A. Performance
B. Positive
C. Non-functional
D. Negative
Correct Answer: D
Which of the following is the MOST effective strategy to prevent an attacker from disabling a network?
A. Design networks with the ability to adapt, reconfigure, and fail over.
Correct Answer: C
What is the FIRST step that should be considered in a Data Loss Prevention (DLP) program?
A. Policy creation
C. Data classification
Correct Answer: C
https://www.examtopics.com/exams/isc/cissp/custom-view/ 32/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which change management role is responsible for the overall success of the project and supporting the change throughout the organization?
A. Change driver
B. Project manager
C. Program sponsor
D. Change implementer
Correct Answer: B
A company needs to provide shared access of sensitive data on a cloud storage to external business partners. Which of the following identity
models is the BEST to blind identity providers (IdP) and relying parties (RP) so that subscriber lists of other parties are not disclosed?
A. Proxied federation
B. Dynamic registration
C. Federation authorities
D. Static registration
Correct Answer: C
A security professional needs to find a secure and efficient method of encrypting data on an endpoint. Which solution includes a root key?
A. Bitlocker
Correct Answer: B
https://www.examtopics.com/exams/isc/cissp/custom-view/ 33/34
24/03/2024 11:26 CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Which combination of cryptographic algorithms are compliant with Federal Information Processing Standard (FIPS) Publication 140-2 for non-
legacy systems?
A. Diffie-hellman (DH) key exchange: DH (>=2048 bits) Symmetric Key: Advanced Encryption Standard (AES) > 128 bits Digital Signature:
B. Diffie-hellman (DH) key exchange: DH (>=2048 bits) Symmetric Key: Advanced Encryption Standard (AES) > 128 bits Digital Signature:
C. Diffie-hellman (DH) key exchange: DH (<=1024 bits) Symmetric Key: Blowfish Digital Signature: Rivest-Shamir-Adleman (RSA) (>=2048 bits)
D. Diffie-hellman (DH) key exchange: DH (>=2048 bits) Symmetric Key: Advanced Encryption Standard (AES) < 128 bits Digital Signature:
Correct Answer: B
What is the PRIMARY purpose of creating and reporting metrics for a security awareness, training, and education program?
D. Comply with legal regulations and document due diligence in security practices.
Correct Answer: A
https://www.examtopics.com/exams/isc/cissp/custom-view/ 34/34