
CISSP Domain 1

Quiz
•
Computers
•
Professional Development
•
Hard
Miftah Rahman
Used 45+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that
determine the risk of a business interruption occurring
determine the technological dependence of the business processes
Identify the operational impacts of a business interruption
Identify the financial impacts of a business interruption
2.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
Which of the following represents the GREATEST risk to data confidentiality?
Network redundancies are not implemented
Security awareness training is not completed
Backup tapes are generated unencrypted
Users have administrative privileges
3.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
A While investigating a malicious event, only six days of audit logs from the last month were available. Whatpolicy should be updated to address this problem
Retention
Reporting
Recovery
Remediation
4.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?
Only when assets are clearly defined
Only when standards are defined
Only when controls are put in place
Only procedures are defined
5.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?
Development, testing, and deployment
Prevention, detection, and remediation
People, technology, and operations
Certification, accreditation, and monitoring
6.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?
25%
50%
75%
100%
7.
MULTIPLE CHOICE QUESTION
5 mins • 5 pts
Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?
Security Governance
Risk Management
Security Portfolio Management
Risk Assessment
Create a free account and access millions of resources
Similar Resources on Wayground
18 questions
CYBER SECURITY

Quiz
•
Professional Development
15 questions
Sec+ Quiz - 2

Quiz
•
Professional Development
15 questions
security+ (601)

Quiz
•
9th Grade - Professio...
24 questions
SC-300: Identity and Access Administrator - TCS

Quiz
•
Professional Development
22 questions
Sec+ Day1 Security Concepts & Threat Types

Quiz
•
Professional Development
25 questions
IT RISK AND CONTROL

Quiz
•
Professional Development
16 questions
Sec+ - 8D - Vulnerability Analysis and Remediation

Quiz
•
Professional Development
20 questions
ISC2 Certified in CyberSecurity Quiz - 2

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade