The CISSP Study Quiz is designed to assess knowledge in information security, focusing on business continuity, risk management, and legal frameworks. It prepares learners for the CISSP certification, enhancing their understanding of essential security principles and practices.
Floods
Environmentalist Strike
Storms
Earthquake
Rate this question:
Punishments may take any and all forms
Social mores and norms which dictate behavior have been inculcated into law
Judges are distinct from attorneys, and are actively involved in fact-finding (to include investigations)
Characterized by heavy reliance on legislative law instead of jurisprudence
Rate this question:
Storage Area network
Off-Site storage
On-site storage
Network attached storage
Rate this question:
Gap
Cost Benefit
Requirement
Vulnerability
Rate this question:
Punishments usually include fines, inability to practice a profession, and possibly incarceration
Behaviors or conduct seen as harmful to the public or society
Damages usually entail monetary restitution, which can be compensatory, punitive, or statutory
Punishments may include loss of personal freedom (to include death) or monetary fines
Rate this question:
Executive management interviews
Overlaying system technology
Organizational chart reviews
Organizational process models
Rate this question:
Services
Acquisition
Development
Design
Rate this question:
Keep a log of every person who had physical custody of the evidence, documenting the actions that they performed on the evidence and at what time
Using sound, repeatable collection techniques that allow for the demonstration of the accuracy and integrity of the evidence
Using sound scientific methods to determine the characteristics of the evidence
Ensuring that the contamination and destruction of the scene are kept to a minimum
Rate this question:
Provides competitive advantage or equal footing
Is not disclosed in legal proceedings
Must generally be not known and provide benefit to the company
Registered with a government registrar
Rate this question:
It is the fastest method of backing up data
It is the slowest method for taking a data backup
A full restoration of data will be slower, since all increments must be restored
It backs up only the files changed since the most recent backup and clears the archive bit
Rate this question:
CCTV
HVAC
Lightning
Fire Suppression
Rate this question:
Divided into intentional torts, wrongs against a person or property, dignitary wrongs, economic wrongs, negligence, nuisance, and strict liability
Deals with the governance of public bodies
Punishments usually include fines, inability to practice a profession, and possibly incarceration
Punishments may include loss of personal freedom (to include death) or monetary fines
Rate this question:
True
False
Rate this question:
Manual access disks
Backup tapes for disaster recovery
Hard drives
Auto-access optical disks
Rate this question:
Common Law
Criminal Law
Tort Law
Administrative Law
Rate this question:
True
False
Rate this question:
Human Resources
Cost of data retention
Data retrieval and use
Inherent aggregation
Rate this question:
Structured Walk-through
Tabletop Exercise
Parallel Test
Simulation Test
Rate this question:
Disaster Recovery Plan
Contingency Plan
Business Continuity Plan
Crisis Communication Plan
Rate this question:
Risk avoidance
Risk Transfer
Risk acceptance
Risk insurance
Rate this question:
Recovery Phase
Triage Phase
Investigative Phase
Post-incident Phase
Rate this question:
Post-incident Phase
Investigative Phase
Recovery Phase
Triage Phase
Rate this question:
True
False
Rate this question:
Hot Site
Mobile Site
Warm Site
Cold Site
Rate this question:
Trademark
Patent
Copyright
Trade Secret
Rate this question:
Contingency Plan
Continuity of Operations plan
Disaster recovery plan
Business Continuity plan
Rate this question:
Present and document various elements of the security architecture in order to ensure strategic alignment
Provide an understanding of the impact on security posture of development and implementation within other domains
Support, enable, and extend security policies and standards
All of the above
Rate this question:
Certification
Accreditation
Recertification
None of the above
Rate this question:
Document current technology positions
Actual placement and layout and interconnectivity in implementation
Compare the current architecture to the target
Results in a strategic roadmap for migrating from current to target (typically, over 3-5 years)
Rate this question:
Design
Acquisition
Development
Services
Rate this question:
True
False
Rate this question:
Business needs change; technology changes; personnel change; threats adapt and grow; constant reassessment and improvement is necessary
Metrics and reporting are required to ensure continuous improvement
Maturity models assist in determining whether an organization is focused on optimization
All of the above
Rate this question:
The Health Insurance Portability and Accountability Act (HIPAA)
The Computer Fraud and Abuse Act (CFAA)
The Payment Card Industry Data Security Standard (PCI DSS)
The Sarbanes-Oxley Act (SOX)
Rate this question:
Vendor has the option to define a set of requirements from a menu of possible options into a Security Target (ST)
Vendors develop products (Targets of Evaluation, or ToEs) and have them evaluated against the ST
Addresses all three Triad elements
All of the above
Rate this question:
Social Engineering Attack
Cross Site Scripting Attack
Distributed Denial of Service Attack
Advanced Persistent Threat
Rate this question:
Authentication
Non-Repudiation
Integrity
Confidentiality
Rate this question:
True
False
Rate this question:
Auditing
Data Backup
Network Architecture
System Access
Rate this question:
The use of CHAP
Time of day restrictions
The use of smart cards
Sign in sheets
Rate this question:
Integrity
Confidentiality
Authentication
Non-repudiation
Rate this question:
Processor
Storage
OS
All of the above
Rate this question:
CCTV
HVAC
Lightning
Fire Suppression
Rate this question:
True
False
Rate this question:
SSL
FTP
SSH
WEP
Rate this question:
Encrypts the message payload
Performed by the end-user
Requires decrypting and re-encrypting at each communications node
Encrypts the routing information
Rate this question:
Access control services
Audit and monitoring services
Boundary control services
Groups and protection services
Rate this question:
True
False
Rate this question:
That are applied enterprise-wide to ensure a consistent level of compliance.
That are applied to a minimum set of controls to ensure a minimum level of compliance
That are based on regulatory requirements
That are not based on a systematic review of risks
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.