
CISSP DOMAIN 1 (Security and Risk Management)
Authored by John Lee
Professional Development
Professional Development
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tom is responsible for his company information security awareness program. He has concerns that the rapid change in technology may make the content outdated. What control can he put in place to protect against this risk?
Gamification
Computer based training
Content reviews
Live Training
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are writing a report to management on the results of a recent risk assessment you conducted. In your report you need to identify the remaining level of risk to the company after the adoption of security controls. What is the term used to describe the risk?
Inherent risk
Residual risk
Control risk
Mitigate risk
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Chan Brothers is an established travel agency in Singapore. They conduct regional tours. Since it is travel hub, many nationalities travel through Singapore and may take tours to the other destinations from it. They receive a request from one of their past EU customers to request for his account to be terminated. Under the General Data Protection Regulation (GDPR) there is a clause that states that individuals may request for their personal data to be no longer processed or disseminated. The clause is:
Right to access
Privacy by design
The right to be forgotten
The right of data portability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sabrina conducted a risk assessment and commended to purchase cyber breach insurance. What type of risk response is that?
Accept
Transfer
Reduce
Reject
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Neal is speaking to his Board of Directors about their responsibility for reviewing the cybersecurity controls of the organization. What rule requires that senior executives take personal responsibility for information security matters?
Due diligence rule
Personal liability rule
Prudent man rule
Due process rule
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alex is a forensics investigator. While investigating a cyber security incident, he discovers that an attacker had used a normal user account but managed to exploit a vulnerability in one of the systems through providing that account with administrative rights. What type of attack took place under the STRIDE threat model?
Spoofing
Repudiation
Tampering
Elevation of privilege
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After completing a Business Continuity Planning you decided to accept one of the risks. What should you so next?
Implement new security controls to reduce the risk level
Design a disaster recovery plan
Repeat the business impact assessment
Document your decision making process
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?