CISSP Prep Quiz: Short 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dbatson
D
Dbatson
Community Contributor
Quizzes Created: 2 | Total Attempts: 5,175
| Attempts: 942 | Questions: 8
Please wait...
Question 1 / 8
0 %
0/100
Score 0/100
1. Requiring approval before granting system access would be:

Explanation

Answer d:
Administrative controls consist of management activities such as organizational policies and procedures.

Submit
Please wait...
About This Quiz
CISSP Prep Quiz: Short 1 - Quiz

This short, 10 question, quiz contains one question from each module of the CISSP practice exam.

2. The Media Access Control (MAC) layer operates as a subset of the:

Explanation

Answer b:
The Media Access Control (MAC) sub-layer of the data-link layer manages protocol access to the physical network medium.

Submit
3. Preparing a full-scale BCP can:

Explanation

Answer b:
Preparing a full-scale BCP can take a long time.

Submit
4. Physical security often follows which of the following models?

Explanation

Answer c:
An easy method of viewing the physical security environment is to think of it as a layered defense model.

Submit
5. Which of the following is NOT one of the four primary objectives of cryptography?

Explanation

Answer d:
A fundamental goal of cryptography is to adequately address
four areas in both theory and practice. Confidentiality is normally achieved by encrypting the message content, data integrity is achieved through cryptographic hashing functions, authentication is achieved through the use of asymmetric cryptography, and non-repudiation is normally achieved through the use of cryptographic digital signatures.

Submit
6. An organization suspects that it has suffered loss due to an employee’s malfeasance. What should be the first step in pursuing this scenario?

Explanation

Answer d:
If there were no policy in place explicitly stating the company’s right to electronically monitor network traffic on company systems, then internal investigators would be well advised not to set up a sniffer on the network to monitor such traffic.

Submit
7. In dedicated security mode, the system must have all of the following EXCEPT:

Explanation

Answer d:
Indirect access is also permitted Dedicated Security Mode.

Submit
8. Shadow recovery of a database is accomplished through:

Explanation

Answer a:
Shadow recovery occurs when transactions are reapplied to a
previous version of the database. Shadow recovery requires the use of transaction logging to identify the last good transaction.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 26, 2008
    Quiz Created by
    Dbatson
Cancel
  • All
    All (8)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Requiring approval before granting system access would be:
The Media Access Control (MAC) layer operates as a subset of the:
Preparing a full-scale BCP can:
Physical security often follows which of the following models?
Which of the following is NOT one of the four primary objectives of...
An organization suspects that it has suffered loss due to an...
In dedicated security mode, the system must have all of the following...
Shadow recovery of a database is accomplished through:
Alert!

Advertisement