CISSP Domain 1

CISSP Domain 1

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

Lesson 5.2 Conducting an InfoSec Risk Assessment

Lesson 5.2 Conducting an InfoSec Risk Assessment

Professional Development

15 Qs

ISC2 Certified in CyberSecurity Quiz - 2

ISC2 Certified in CyberSecurity Quiz - 2

Professional Development

20 Qs

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

Professional Development

15 Qs

Chapter 3 Quiz

Chapter 3 Quiz

Professional Development

20 Qs

Privacy in the Modern Era

Privacy in the Modern Era

Professional Development

20 Qs

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

Professional Development

20 Qs

CISSP Domain 1

CISSP Domain 1

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Miftah Rahman

Used 45+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

determine the risk of a business interruption occurring

determine the technological dependence of the business processes

Identify the operational impacts of a business interruption

Identify the financial impacts of a business interruption

2.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following represents the GREATEST risk to data confidentiality?

Network redundancies are not implemented

Security awareness training is not completed

Backup tapes are generated unencrypted

Users have administrative privileges

3.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

A While investigating a malicious event, only six days of audit logs from the last month were available. Whatpolicy should be updated to address this problem

Retention

Reporting

Recovery

Remediation

4.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

When assessing an organization’s security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

Only when assets are clearly defined

Only when standards are defined

Only when controls are put in place

Only procedures are defined

5.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

Development, testing, and deployment

Prevention, detection, and remediation

People, technology, and operations

Certification, accreditation, and monitoring

6.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

A control to protect from a Denial-of-Service (DoS) attach has been determined to stop 50% of attacks, and additionally reduces the impact of an attack by 50%. What is the residual risk?

25%

50%

75%

100%

7.

MULTIPLE CHOICE QUESTION

5 mins • 5 pts

Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

Security Governance

Risk Management

Security Portfolio Management

Risk Assessment

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?