Search Header Logo

isc2 sample questions

Authored by Frank Gwada

Computers

Professional Development

Used 12+ times

isc2 sample questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of the risk management process?

Ignore the probability or impact of unfortunate events
Maximize the probability of unfortunate events
Outsource the risk management process

To identify the Assess and mitigate risks

Answer explanation

The risk management process involves identifying, assessing, and mitigating risks to an acceptable level, rather than attempting to eliminate all risks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which module of security principles focuses on establishing guidelines for security behavior within an organization?

Module 1: Understand the Security Concepts of Information Assurance

Module 2: Understand the Risk Management Process

Module 3: Understand Security Controls

Module 5: Understand ISC2 Code of Ethics

Answer explanation

ISC2 Code of Ethics provides guidelines for ethical behavior related to security practices within an organization.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of the module that involves the identification, analysis, and prioritization of incidents in incident response?

Module 1: Understand Incident Response

Module 2: Understand Business Continuity

Module 3: Understand Disaster Recovery

Answer explanation

Module 1 focuses on the incident response process, which includes the identification, analysis, and prioritization of incidents.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of physical access controls?

To restrict access to computer systems and networks

To secure physical locations and assets

To encrypt data transmissions

To prevent malware infections

Answer explanation

Physical access controls are designed to secure physical locations and assets, such as buildings, rooms, and equipment.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT one of the CIA triad principles of information security?

Confidentiality

Integrity

Availability

Reliability

Answer explanation

Reliability is not part of the CIA triad. It focuses on maintaining consistent performance, not security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the risk management process?

Implement risk mitigation strategies.

Identify and assess risks

Monitor and review risks.

Develop risk acceptance criteria.

Answer explanation

Identifying and assessing risks is the initial step to understand potential threats.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of control is most effective in preventing unauthorized physical access to a data center?

Preventive control

Detective control

Corrective control

Recovery control

Answer explanation

Preventive controls, like access control systems, actively stop unauthorized access.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?