CISSP Domain 1

CISSP Domain 1

Professional Development

20 Qs

quiz-placeholder

Similar activities

Part 1.8

Part 1.8

Professional Development

20 Qs

MS-102 ADMINISTRATOR MICROSOFT 365

MS-102 ADMINISTRATOR MICROSOFT 365

Professional Development

20 Qs

Security Domain

Security Domain

Professional Development

20 Qs

Activity2

Activity2

Professional Development

15 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Impact of Technology

Impact of Technology

University - Professional Development

17 Qs

CYBER SECURITY

CYBER SECURITY

Professional Development

20 Qs

GCP-FOUND-SET6

GCP-FOUND-SET6

Professional Development

20 Qs

CISSP Domain 1

CISSP Domain 1

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Miftah Rahman

Used 46+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

All of the following items should be included FIRST in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

determine the risk of a business interruption occurring

determine the technological dependence of the business processes

Identify the operational impacts of a business interruption

Identify the financial impacts of a business interruption

2.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following represents the GREATEST risk to data confidentiality?

Network redundancies are not implemented

Security awareness training is not completed

Backup tapes are generated unencrypted

Users have administrative privileges

3.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

A While investigating a malicious event, only six days of audit logs from the last month were available. Whatpolicy should be updated to address this problem

Retention

Reporting

Recovery

Remediation

4.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

Only when assets are clearly defined

Only when standards are defined

Only when controls are put in place

Only procedures are defined

5.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

Development, testing, and deployment

Prevention, detection, and remediation

People, technology, and operations

Certification, accreditation, and monitoring

6.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

25%

50%

75%

100%

7.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

Security Governance

Risk Management

Security Portfolio Management

Risk Assessment

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?