CISSP Security and Risk Management Quiz

CISSP Security and Risk Management Quiz

Professional Development

90 Qs

quiz-placeholder

Similar activities

kc erp

kc erp

Professional Development

94 Qs

Windows OS

Windows OS

University - Professional Development

95 Qs

WP part 2

WP part 2

12th Grade - Professional Development

87 Qs

Cuestionario de Redes II

Cuestionario de Redes II

Professional Development

90 Qs

Project Management Certification

Project Management Certification

Professional Development

87 Qs

TBDĐ chương 2 3

TBDĐ chương 2 3

Professional Development

95 Qs

OCR GCSE Computer Science - J276 1.1 - 1.7

OCR GCSE Computer Science - J276 1.1 - 1.7

KG - Professional Development

91 Qs

DS QUIZ 1

DS QUIZ 1

Professional Development

85 Qs

CISSP Security and Risk Management Quiz

CISSP Security and Risk Management Quiz

Assessment

Quiz

Computers

Professional Development

Medium

Created by

skyronight 420

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

90 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

You are completing a review of the controls used to protect a media storage facility in your organization and would like to properly categorize each control that is currently in place. Which of the following control categories accurately describe a fence around a facility? (Select all that apply.)

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Laura has been asked to perform an SCA. What type of organization is she most likely in?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Mary is helping a computer user who sees the following message appear on his computer screen. What type of attack has occurred?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Which one of the following organizations would not be automatically subject to the privacy and security requirements of HIPAA if they engage in electronic transactions?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Renee is designing the long-term security plan for her organization and has a three- to five-year planning horizon. H

Evaluate responses using AI:

OFF

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Ryan is a CISSP-certified cybersecurity professional working in a nonprofit organization. Which of the following ethical obligations apply to his work? (Select all that apply.)

(ISC)2 Code of Ethics

Organizational code of ethics

Federal code of ethics

RFC 1087

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Alan is performing threat modeling and decides that it would be useful to decompose the system into the core elements shown here. What tool is he using?

Evaluate responses using AI:

OFF

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?