Search Header Logo

CISSP Domain 1

Authored by Miftah Rahman

Computers

Professional Development

Used 48+ times

CISSP Domain 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

All of the following items should be included FIRST in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

determine the risk of a business interruption occurring

determine the technological dependence of the business processes

Identify the operational impacts of a business interruption

Identify the financial impacts of a business interruption

2.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following represents the GREATEST risk to data confidentiality?

Network redundancies are not implemented

Security awareness training is not completed

Backup tapes are generated unencrypted

Users have administrative privileges

3.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

A While investigating a malicious event, only six days of audit logs from the last month were available. Whatpolicy should be updated to address this problem

Retention

Reporting

Recovery

Remediation

4.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

Only when assets are clearly defined

Only when standards are defined

Only when controls are put in place

Only procedures are defined

5.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

Development, testing, and deployment

Prevention, detection, and remediation

People, technology, and operations

Certification, accreditation, and monitoring

6.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

25%

50%

75%

100%

7.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

Security Governance

Risk Management

Security Portfolio Management

Risk Assessment

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?