Search Header Logo

CISSP Domain 2 (Asset Security)

Authored by John Lee

Professional Development

Professional Development

Used 6+ times

CISSP Domain 2 (Asset Security)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Brenda is an information security architect at a financial institution. She wants to ensure that the transactions are secure as they traverse the network. She recommends the use of TLS. What threat is she attempting to stop and what method is she using to prevent it?

Man in the middle, VPN

Packet injection, Encryption

Sniffing, encryption

Sniffing, TEMPEST

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Doreen’s company is operating a hybrid cloud environment. There are on prem (on site) and cloud based systems. She is doing monitoring on prem (on site). As the number of cloud users are growing, she needs to apply security policies. What type of tool is best suited for this purpose?

A NGFW

A CASB

An IDS

A SOAR

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When media is labelled based on the classification of the data it contains, what rule is typically applied regarding labels?

The data is labelled based on its integrity requirements

The media is labelled based on the highest classification level of the data it contains

The label is labelled with all levels of classification of the data it contains

The media is labelled with the lowest level of classification of the data it contains

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following administrative processes assists organizations in assigning appropriate levels of security control to sensitive information?

Data classification

Remanence

Transmitting data

Clearing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a data retention policy helps to reduce liability?

By ensuring that unneeded data isn’t retained

By ensuring that incriminating data is destroyed

By ensuring that data is securely wiped so it cannot be restored for legal discovery

By reducing the cost of data storage required by law

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Staff in an IT department who are delegated responsibility for day to day tasks hold what data role?

Business owner

User

Data processor

Custodian

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Neal is tasked with identifying security controls for systems covered by his organization’s information classification system. Why might Neal choose to use a security baseline?

It applies in all circumstances, allowing consistent security controls

They are approved by industry standard bodies, preventing liability

They provide a good starting point that can be tailored to organizational needs

They ensure that systems are always in secure state

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development