As a security professional, you have been tasked with conducting a Business Impact Analysis (BIA) for the physical assets of your organization. You are aware that there are several key considerations that need to be taken into account. Which of the following is a key consideration when conducting a BIA for physical assets?
#01 CISSP: Full Coverage Mastery Exam 1 - Challenging

Quiz
•
Computers
•
Professional Development
•
Hard
Kim undefined
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The level of encryption used on the assets
The type of access controls used on the assets
The criticality of the assets to business operations
The availability of the assets to users
Answer explanation
"The criticality of the assets to business operations". This is because a Business Impact Analysis primarily focuses on identifying the importance of different business functions and processes, and the necessity of specific assets to the continued operations of the business. While encryption and access controls are important security considerations, the BIA is more concerned with how critical the asset is to the business operations and what impact its loss would have. Availability is also a critical factor, but it is often considered within the context of how it affects the business operation's continuity and recovery objectives.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security professional working for a company that uses a cloud-based service to authenticate users through Security Assertion Markup Language (SAML) assertions. However, an attacker was able to intercept a SAML assertion during transmission and modify its content to gain unauthorized access to the system. Which of the following is the MOST common type of attack used to exploit this vulnerability?
Man-in-the-middle (MitM) attack
Cross-site scripting (XSS) attack
SQL injection (SQLi) attack
Denial-of-service (DoS) attack
Answer explanation
tions are intercepted and modified, it is indicative of a MitM attack, where the attacker has placed themselves in the communication path to capture and alter the SAML assertions being transmitted. This type of attack would allow an attacker to gain unauthorized access by impersonating a legitimate user or altering the assertion's content.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Considering current cybersecurity standards, which protocol among the following options is outdated and should be avoided due to its known vulnerabilities?
Secure Sockets Layer (SSL) 3.0
Internet Protocol Security (IPSec)
Secure Hash Algorithm 3 (SHA-3)
Transport Layer Security (TLS) 1.3
Answer explanation
"Secure Sockets Layer (SSL) 3.0". SSL 3.0 is an outdated protocol that has been superseded by the Transport Layer Security (TLS) protocols due to various well-known security issues, including the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack. Modern security practices recommend using the latest versions of TLS for secure communications, as SSL 3.0 is no longer considered secure.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a security analyst, you are tasked with describing the concept of a "zero trust" security model in a cybersecurity context. Which of the following options BEST describes this concept?
Trusting all users, devices, and applications within the network by default.
Implementing strict access controls and continuously verifying trust for all users, devices, and applications, regardless of location.
Allowing open access to all network resources based on user roles and permissions.
Relying solely on firewalls and other perimeter defenses to protect against external threats.
Answer explanation
"Implementing strict access controls and continuously verifying trust for all users, devices, and applications, regardless of location". This option aligns with the principle of "never trust, always verify", which is the foundation of the zero trust model. It emphasizes the need for strict access control and continuous verification of credentials, rather than assuming trust based on the network's perimeter or the user's location.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In an asymmetric encryption system, if Bob wants to send a confidential message to Alice, which key should he use to encrypt the message?
Alice's private key
Bob's private key
Bob's public key
Alice's public key
Answer explanation
In asymmetric encryption systems, if Bob wants to send a confidential message to Alice, he should use Alice's public key to encrypt the message. This ensures that only Alice, who has the corresponding private key, can decrypt and read the message. The correct answer is:
Alice's public key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a lattice-based access control model?
An access control model where permissions are determined by a user's role within an organization.
An access control model where permissions are tied to an object and the operations that can be performed on that object.
An access control model that utilizes a structure of security labels and clearances to determine access rights.
An access control model that allows users to determine permissions for their own files.
Answer explanation
An access control model that utilizes a structure of security labels and clearances to determine access rights.
This option is the definition of a lattice-based access control model, which uses a lattice of labels to represent the levels of information and the clearances users have, and allows the assignment of rights based on these levels.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are a security professional working for a highly secure organization. Your team has been tasked with implementing an authorization mechanism that tightly controls data access in the environment. Which of the following authorization mechanisms would be BEST suited for this high-security environment?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Attribute-Based Access Control (ABAC)
Discretionary Access Control (DAC)
Answer explanation
Mandatory Access Control (MAC).
MAC is an access control policy determined by a computer security policy that is used in the most secure environments. In MAC, access rights are assigned based on regulations from a central authority and cannot be altered by users. This control is mandatory in the sense that individual object owners cannot alter the access. It's typically used in environments that require a high level of security, such as military institutions or government agencies, where information classification and confidentiality are critical.
Create a free account and access millions of resources
Similar Resources on Quizizz
45 questions
Android ATC_Practice 2

Quiz
•
Professional Development
54 questions
PART 1

Quiz
•
Professional Development
50 questions
CWT-101 Part 1

Quiz
•
Professional Development
50 questions
Security+ Authentication Design Concepts

Quiz
•
Professional Development
45 questions
Security+ Incident Response and Computer Forensics

Quiz
•
Professional Development
55 questions
ITF+ Study Quiz 9

Quiz
•
Professional Development
50 questions
CCNA Day 4

Quiz
•
Professional Development
50 questions
Networking Quiz _ 1

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade