CISSP Prep Quiz: Domain 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Andy
A
Andy
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,426
| Attempts: 2,426 | Questions: 18
Please wait...
Question 1 / 18
0 %
0/100
Score 0/100
1. 3. Integrity is protection of data from all of the following EXCEPT:

Explanation

Answer c:
Integrity is the protection of system information or processes from intentional or accidental unauthorized changes. Data analysis would usually be associated with confidentiality.

Submit
Please wait...
About This Quiz
CISSP Quizzes & Trivia

This quiz contains example questions for the CISSP certification exam. The questions in this quiz were taken from the:OFFICIAL (ISC)2® GUIDE TO THE CISSP® EXAM

2. 2. Masquerading is:

Explanation

Answer b:
Pretending to be the authorized user.

Submit
3. 9. The percentage or degree of damage inflicted on an asset used in the calculation of single loss expectancy can be referred to as:

Explanation

Answer a:
This factor represents a measure of the magnitude of loss or
impact on the value of an asset. It is expressed as a percent, ranging from 0% to 100%, of asset value loss arising from a threat event. This factor is used in the calculation of single loss expectancy (SLE).

Submit
4. 17. A main objective of awareness training is:

Explanation

Answer a:
All employees must understand their basic security responsibilities.

Submit
5. 18. What is a primary target of a person employing social engineering?

Explanation

Answer a:
Social engineering deals with individual dynamics as opposed to group dynamics, as the primary targets are help desks and/or administrative or technical support people.

Submit
6. 7. In an accounting department, several people are required to complete a financial process. This is most likely an example of:

Explanation

Answer a:
No single employee has control of a transaction from beginning to end; two or more people should be responsible for performing it.

Submit
7. 20. Incident response planning can be instrumental in:

Explanation

Answer c:
The goals of a well-prepared incident response team are to detect potential information security breaches and provide an effective and efficient means of dealing with the situation in a manner that reduces the potential impact to the corporation.

Submit
8. 4. A security program cannot address which of the following business goals?

Explanation

A security program focuses on protecting an organization's assets, information, and resources from unauthorized access, threats, and vulnerabilities. While user expectations are important for overall user satisfaction and experience, they are not directly addressed by a security program. The other options (A, B, and D) are all aspects that a security program can address to varying degrees.

Submit
9. 5. In most cases, integrity is enforced through:

Explanation

Answer d:
Integrity depends on access controls; therefore, it is necessary to positively and uniquely identify and authorize all persons who attempt access.
Answers a and b are good but not thorough enough on their own — they are portions of a complete access control system.

Submit
10. 8. Risk Management is commonly understood as all of the following EXCEPT:

Explanation

Answer d:
The processes of identifying, analyzing, and assessing, mitigating, or transferring risk is generally characterized as risk management.

Submit
11. 13. Data classification can assist an organization in:

Explanation

Answer c:
Data classification is intended to lower the cost of overprotecting all data.

Submit
12. 10. The absence of a fire-suppression system would be best characterized as a(n):

Explanation

Answer c:
This term characterizes the absence or weakness of a risk-reducing safeguard.

Submit
13. 16. The role of an information custodian should NOT include:

Explanation

Answer c:
Ensure record retention requirements are met based on the information owner’s analysis.

Submit
14. 11. Risk Assessment includes all of the following EXCEPT:

Explanation

Answer a:
Fundamental applications of risk assessment to be addressed
include (1) determining the current status of information security in the target environment(s) and ensuring that associated risk is managed (accepted, mitigated, or transferred) according to policy, and (2) assessing risk strategically.

Submit
15. Who “owns” an organization’s data?

Explanation

Answer d:
The business units, not IT (information technology), own the
data. Decisions regarding who has what access, what classification the data should be assigned, etc., are decisions that rest solely with the business data owner and based on organization policy.

Submit
16. 15. An information security policy does NOT usually include:

Explanation

Answer b:
Policy is written at a very high level and is intended to describe the “whats” of information security. Procedures, standards, baselines, and guidelines are the “hows” for implementation of the policy.

Submit
17. 12. A risk management project may be subject to overlooking certain types of threats. What can assist the risk management team to prevent that?

Explanation

Answer a:
The best automated tools currently available include a well researched threat population and associated statistics. Using one of these tools virtually assures that no relevant threat is overlooked.

Submit
18. 19. Social engineering can take many forms EXCEPT:

Explanation

Social engineering is a manipulation tactic used to deceive individuals into divulging confidential information or taking certain actions. While it can involve tactics like dumpster diving (searching through trash for information), coercion, or sympathy, eavesdropping typically refers to the act of secretly listening to conversations, which is a different method of information gathering rather than manipulation.

Submit
View My Results

Quiz Review Timeline (Updated): Sep 4, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 04, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 12, 2018
    Quiz Created by
    Andy
Cancel
  • All
    All (18)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
3. Integrity is protection of data from all of the following EXCEPT:
2. Masquerading is:
9. The percentage or degree of damage inflicted on an asset used in...
17. A main objective of awareness training is:
18. What is a primary target of a person employing social engineering?
7. In an accounting department, several people are required to...
20. Incident response planning can be instrumental in:
4. A security program cannot address which of the following business...
5. In most cases, integrity is enforced through:
8. Risk Management is commonly understood as all of the following...
13. Data classification can assist an organization in:
10. The absence of a fire-suppression system would be best...
16. The role of an information custodian should NOT include:
11. Risk Assessment includes all of the following EXCEPT:
Who “owns” an organization’s data?
15. An information security policy does NOT usually include:
12. A risk management project may be subject to overlooking certain...
19. Social engineering can take many forms EXCEPT:
Alert!

Advertisement