CISSP Final

CISSP Final

Professional Development

98 Qs

quiz-placeholder

Similar activities

ajax

ajax

Professional Development

102 Qs

1-5 N+

1-5 N+

University - Professional Development

100 Qs

11 - 15 N+

11 - 15 N+

University - Professional Development

100 Qs

EC 2 2nd Sem-Curri Dev

EC 2 2nd Sem-Curri Dev

Professional Development

100 Qs

CDCs Vol 2 Set 2

CDCs Vol 2 Set 2

Professional Development

101 Qs

Hacker Academy - Ethical Hacking Quiz

Hacker Academy - Ethical Hacking Quiz

Professional Development

100 Qs

Engineering Management

Engineering Management

Professional Development

100 Qs

Certified Buisness Analysis Professional (CBAP) (101 Question)

Certified Buisness Analysis Professional (CBAP) (101 Question)

Professional Development

101 Qs

CISSP Final

CISSP Final

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Sylvia Anderson

Used 8+ times

FREE Resource

98 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In an infrastructure-as-a-service (IaaS) cloud model, who bears primary responsibility for securing physical and information assets?

Responsibility primarily rests with the customer

Responsibility primarily rests with the provider

Responsibility is shared between the customer and provider

Responsibility primarily rests with the cloud access security broker

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a federated identity access management solution, what task is most commonly handled by the identity provider (IdP)?

Identification

Authorization

Provisioning

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are working with a team of software and hardware developers on the creation of a new product that will deploy sensors to factory floors and then analyze the data from those sensors using a back-end SaaS solution. Before you develop the software, you would like to understand the potential paths that an attacker could take to undermine the security of the system. What activity would best provide you with this perspective?

Threat hunting

Threat modeling

Penetration testing

Vulnerability scanning

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You recently performed a vulnerability assessment and found hundreds of vulnerabilities in your organization's infrastructure. It will take months to address all of these issues. What factors should you use to prioritize these vulnerabilities?

Likelihood and probability

Impact and exploitability

Impact and CVSS score

Likelihood and impact

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are attempting to secure a wired network belonging to your organization. You would like to deploy technology that limits network access to authorized users. Which one of the following technologies would best meet that need?

WiFi Protected Access v2 (WPA2)

WiFi Protected Access v3 (WPA3)

IEEE 802.1x

MAC filtering

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user connected a device to your network and, when they open their web browser, are redirected to a website advising them that they have been placed on an isolation network because their system does not meet the organization's security requirements. They are unable to access any network resources until they remediate their device to comply with the organization's security policy. What type of security solution is in use on this network?

Intrusion Prevention System (IPS)

Configuration Management (CM) platform

Network Access Control (NAC)

Endpoint Detection and Response (EDR) platform

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have been asked to assist in the investigation of a security incident that took place in your organization. You are handed a laptop computer that is powered off and asked to analyze the data contained on its hard drive. What action should you take first?

Remove the hard drive from the device

Power on the laptop

Connect to the hard drive with a forensic software package

Connect a write blocker to the device

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?