CISSP Quiz #1

20 Questions  I  By Cissp
Sample CISSP quiz

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  All of the following are basic components of a security policy EXCEPT the
A.
B.
C.
D.
2.  A security policy would include all of the following EXCEPT
A.
B.
C.
D.
3.  Which one of the following is an important characteristic of an information security policy?
A.
B.
C.
D.
4.  Ensuring the integrity of business information is the PRIMARY concern of
A.
B.
C.
D.
5.  Which of the following would be the first step in establishing an information security program?
A.
B.
C.
D.
6.  Which of the following department managers would be best suited to oversee the development of an information security policy?
A.
B.
C.
D.
7.  What is the function of a corporate information security policy?
A.
B.
C.
D.
8.  Why must senior management endorse a security policy?
A.
B.
C.
D.
9.  In which one of the following documents is the assignment of individual roles and responsibilities MOST appropriately defined?
A.
B.
C.
D.
10.  Which of the following defines the intent of a system security policy?
A.
B.
C.
D.
11.  When developing an information security policy, what is the FIRST step that should be taken?
A.
B.
C.
D.
12.  Which one of the following should NOT be contained within a computer policy?
A.
B.
C.
D.
13.  Which one of the following is NOT a fundamental component of a Regulatory Security Policy?
A.
B.
C.
D.
14.  Which one of the following statements describes management controls that are instituted to implement a security policy?
A.
B.
C.
D.
15.  Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
A.
B.
C.
D.
16.  Which of the following choices is NOT part of a security policy?
17.  In an organization, an Information Technology security function should:
A.
B.
C.
D.
18.  Which of the following embodies all the detailed actions that personnel are required to follow?
A.
B.
C.
D.
19.  A significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible. The action does NOT include:
A.
B.
C.
D.
20.  Network Security is a process that is:
A.
B.
C.
D.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz