CISSP Domain 2 (Asset Security)

CISSP Domain 2 (Asset Security)

Professional Development

10 Qs

quiz-placeholder

Similar activities

CyberSecurity

CyberSecurity

Professional Development

12 Qs

Volza 1st Intermediate quiz

Volza 1st Intermediate quiz

Professional Development

10 Qs

ISMS quiz November

ISMS quiz November

Professional Development

10 Qs

AWS Certified Cloud Practitioner

AWS Certified Cloud Practitioner

Professional Development

15 Qs

Big Data Application Testing

Big Data Application Testing

Professional Development

11 Qs

Quiz - Global Sales (Leisure): Gateway Information Awareness

Quiz - Global Sales (Leisure): Gateway Information Awareness

Professional Development

7 Qs

ISMS quiz July

ISMS quiz July

Professional Development

8 Qs

Python Libraries Series - Pandas

Python Libraries Series - Pandas

Professional Development

11 Qs

CISSP Domain 2 (Asset Security)

CISSP Domain 2 (Asset Security)

Assessment

Quiz

Professional Development

Professional Development

Hard

Created by

John Lee

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Brenda is an information security architect at a financial institution. She wants to ensure that the transactions are secure as they traverse the network. She recommends the use of TLS. What threat is she attempting to stop and what method is she using to prevent it?

Man in the middle, VPN

Packet injection, Encryption

Sniffing, encryption

Sniffing, TEMPEST

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Doreen’s company is operating a hybrid cloud environment. There are on prem (on site) and cloud based systems. She is doing monitoring on prem (on site). As the number of cloud users are growing, she needs to apply security policies. What type of tool is best suited for this purpose?

A NGFW

A CASB

An IDS

A SOAR

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When media is labelled based on the classification of the data it contains, what rule is typically applied regarding labels?

The data is labelled based on its integrity requirements

The media is labelled based on the highest classification level of the data it contains

The label is labelled with all levels of classification of the data it contains

The media is labelled with the lowest level of classification of the data it contains

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following administrative processes assists organizations in assigning appropriate levels of security control to sensitive information?

Data classification

Remanence

Transmitting data

Clearing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a data retention policy helps to reduce liability?

By ensuring that unneeded data isn’t retained

By ensuring that incriminating data is destroyed

By ensuring that data is securely wiped so it cannot be restored for legal discovery

By reducing the cost of data storage required by law

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Staff in an IT department who are delegated responsibility for day to day tasks hold what data role?

Business owner

User

Data processor

Custodian

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Neal is tasked with identifying security controls for systems covered by his organization’s information classification system. Why might Neal choose to use a security baseline?

It applies in all circumstances, allowing consistent security controls

They are approved by industry standard bodies, preventing liability

They provide a good starting point that can be tailored to organizational needs

They ensure that systems are always in secure state

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?