isc2 sample questions

isc2 sample questions

Professional Development

14 Qs

quiz-placeholder

Similar activities

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Professional Development

12 Qs

SOF Day 2 Review

SOF Day 2 Review

Professional Development

11 Qs

SIRI Day 2 Review

SIRI Day 2 Review

Professional Development

11 Qs

BDR Quiz

BDR Quiz

Professional Development

11 Qs

Incident Response Quiz

Incident Response Quiz

Professional Development

14 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

Professional Development

10 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

Professional Development

15 Qs

Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

Professional Development

15 Qs

isc2 sample questions

isc2 sample questions

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Frank Gwada

Used 12+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of the risk management process?

Ignore the probability or impact of unfortunate events
Maximize the probability of unfortunate events
Outsource the risk management process

To identify the Assess and mitigate risks

Answer explanation

The risk management process involves identifying, assessing, and mitigating risks to an acceptable level, rather than attempting to eliminate all risks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which module of security principles focuses on establishing guidelines for security behavior within an organization?

Module 1: Understand the Security Concepts of Information Assurance

Module 2: Understand the Risk Management Process

Module 3: Understand Security Controls

Module 5: Understand ISC2 Code of Ethics

Answer explanation

ISC2 Code of Ethics provides guidelines for ethical behavior related to security practices within an organization.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of the module that involves the identification, analysis, and prioritization of incidents in incident response?

Module 1: Understand Incident Response

Module 2: Understand Business Continuity

Module 3: Understand Disaster Recovery

Answer explanation

Module 1 focuses on the incident response process, which includes the identification, analysis, and prioritization of incidents.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of physical access controls?

To restrict access to computer systems and networks

To secure physical locations and assets

To encrypt data transmissions

To prevent malware infections

Answer explanation

Physical access controls are designed to secure physical locations and assets, such as buildings, rooms, and equipment.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT one of the CIA triad principles of information security?

Confidentiality

Integrity

Availability

Reliability

Answer explanation

Reliability is not part of the CIA triad. It focuses on maintaining consistent performance, not security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the risk management process?

Implement risk mitigation strategies.

Identify and assess risks

Monitor and review risks.

Develop risk acceptance criteria.

Answer explanation

Identifying and assessing risks is the initial step to understand potential threats.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of control is most effective in preventing unauthorized physical access to a data center?

Preventive control

Detective control

Corrective control

Recovery control

Answer explanation

Preventive controls, like access control systems, actively stop unauthorized access.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?