isc2 sample questions

Quiz
•
Computers
•
Professional Development
•
Easy

Frank Gwada
Used 12+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of the risk management process?
To identify the Assess and mitigate risks
Answer explanation
The risk management process involves identifying, assessing, and mitigating risks to an acceptable level, rather than attempting to eliminate all risks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which module of security principles focuses on establishing guidelines for security behavior within an organization?
Module 1: Understand the Security Concepts of Information Assurance
Module 2: Understand the Risk Management Process
Module 3: Understand Security Controls
Module 5: Understand ISC2 Code of Ethics
Answer explanation
ISC2 Code of Ethics provides guidelines for ethical behavior related to security practices within an organization.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary focus of the module that involves the identification, analysis, and prioritization of incidents in incident response?
Module 1: Understand Incident Response
Module 2: Understand Business Continuity
Module 3: Understand Disaster Recovery
Answer explanation
Module 1 focuses on the incident response process, which includes the identification, analysis, and prioritization of incidents.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of physical access controls?
To restrict access to computer systems and networks
To secure physical locations and assets
To encrypt data transmissions
To prevent malware infections
Answer explanation
Physical access controls are designed to secure physical locations and assets, such as buildings, rooms, and equipment.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT one of the CIA triad principles of information security?
Confidentiality
Integrity
Availability
Reliability
Answer explanation
Reliability is not part of the CIA triad. It focuses on maintaining consistent performance, not security.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in the risk management process?
Implement risk mitigation strategies.
Identify and assess risks
Monitor and review risks.
Develop risk acceptance criteria.
Answer explanation
Identifying and assessing risks is the initial step to understand potential threats.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of control is most effective in preventing unauthorized physical access to a data center?
Preventive control
Detective control
Corrective control
Recovery control
Answer explanation
Preventive controls, like access control systems, actively stop unauthorized access.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
#02 Incident Response, BC, and DR Concepts

Quiz
•
Professional Development
10 questions
Gordon's Review: Mod 1 Intro to Cybersecurity

Quiz
•
Professional Development
15 questions
Activity2

Quiz
•
Professional Development
10 questions
IT ENGLISH: Research Project Topics - Workflow Automation

Quiz
•
Professional Development
19 questions
CCSP Domain 1

Quiz
•
Professional Development
17 questions
MOC 20744C-Securing Windows Server 2016 - Part 2

Quiz
•
Professional Development
10 questions
Mitigation Techniques and Controls

Quiz
•
Professional Development
10 questions
Is Your AWS Cloud Well Architected

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade