Search Header Logo

CISSP Domain 7

Authored by Miftah Rahman

Computers

Professional Development

Used 20+ times

CISSP Domain 7
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?

Absence of a Business Intelligence (BI) solution

Inadequate cost modeling

Improper deployment of the Service-Oriented Architecture (SOA)

Insufficient Service Level Agreement (SLA)

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

What is the PRIMARY reason for implementing change management?

Certify and approve releases to the environment

Provide version rollbacks for system changes

Ensure that all applications are approved

Ensure accountability for changes to the environment

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is a PRIMARY advantage of using a third-party identity service?

Consolidation of multiple providers

Directory synchronization

Web based logon

Automated account management

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?

Continuously without exception for all security controls

Before and after each change of the control

At a rate concurrent with the volatility of the security control

Only during system implementation and decommissioning

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A Business Continuity Plan/Disaster Recovery Plan (BCP/DRP) will provide which of the following?

Guaranteed recovery of all business functions

Minimization of the need decision making during a crisis

Insurance against litigation following a disaster

Protection from loss of organization resources

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is the FIRST step in the incident response process?

Determine the cause of the incident

Disconnect the system involved from the network

Isolate and contain the system involved

Investigate all symptoms to confirm the incident

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

A continuous information security monitoring program can BEST reduce risk through which of the following?

Collecting security events and correlating them to identify anomalies

Facilitating system-wide visibility into the activities of critical user accounts

Encompassing people, process, and technology

Logging both scheduled and unscheduled system changes

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?