Trivia Quiz On CISSP Exam!

29 Questions | Total Attempts: 72

SettingsSettingsSettings
CISSP Quizzes & Trivia

.


Questions and Answers
  • 1. 
    What type of federal government computing system requires that all individuals accessing the system have a need to know all of the information processed by that system?
    • A. 

      Dedicated

    • B. 

      System High

    • C. 

      Compartmented

    • D. 

      Multilevel

  • 2. 
    In which of the following security modes can you be assured that all users have access permissions for all information processed by the system but will not necessarily need to know of all that information?
    • A. 

      Dedicated

    • B. 

      System high

    • C. 

      Compartmented

    • D. 

      Multilevel

  • 3. 
    In what security mode must each user have the access approval and valid need to know for all information processed by a system?
    • A. 

      Dedicated

    • B. 

      System high

    • C. 

      Compartmented

    • D. 

      Multilevel

  • 4. 
    Which one of the following security modes does NOT require that all users have a security clearance for the highest level of information processed by the system?
    • A. 

      Dedicated

    • B. 

      System high

    • C. 

      Compartmented

    • D. 

      Multilevel

  • 5. 
    Which security mode provides the most granular control over resources and users?
    • A. 

      Dedicated

    • B. 

      System high

    • C. 

      Compartmented

    • D. 

      Multilevel

  • 6. 
    What security mode allows systems to process information at more than one level of security even when all users do not have appropriate clearances?
    • A. 

      Dedicated

    • B. 

      System high

    • C. 

      Compartmented

    • D. 

      Multilevel

  • 7. 
    On a much smaller scale, _____________ is deployed to repair or restore capability, functionality, or resources following a violation of security policy.
    • A. 

      Recovery access control

    • B. 

      Corrective access control

    • C. 

      Detective access control

    • D. 

      Compensation access control

  • 8. 
    Once a system is compromised, _____________ is deployed to restore it to its previous known good state.
    • A. 

      Compensation access control

    • B. 

      Recovery access control

    • C. 

      Restoration access control

    • D. 

      Corrective access control

  • 9. 
    What procedure returns business facilities and environments to a working state?
    • A. 

      Reparation

    • B. 

      Restoration

    • C. 

      Respiration

    • D. 

      Recovery

  • 10. 
    What procedure returns business operations and processes to a working state?
    • A. 

      Recovery

    • B. 

      Restoration

    • C. 

      Reparation

    • D. 

      Respiration

  • 11. 
    What is the practice of establishing emergency-response actions following a business related disaster?
    • A. 

      Mutual assistance agreements

    • B. 

      Business continuity planning

    • C. 

      Software escrow

    • D. 

      Disaster recovery planning

  • 12. 
    What is the preventative practice of establishing and planning for business related threats and risks?
    • A. 

      Disaster recovery planning

    • B. 

      Business continuity planning

    • C. 

      Mutual assistance agreements

    • D. 

      Software Escrow

  • 13. 
    What action usually closes the identification phase of incident response?
    • A. 

      Publishing an incident report

    • B. 

      Gathering evidence of the incident

    • C. 

      Notifying the incident response team

    • D. 

      Isolating compromised systems

  • 14. 
    What type of information is not normally included in the risk acceptance/mitigation portion of the BCP.
    • A. 

      Reasons for accepting risks

    • B. 

      Potential future events that might warrant reconsideration of the decision

    • C. 

      Identification of insurance policies that apply to a given risks

  • 15. 
    Which of the following elements is not necessary in the BCP documentation?
    • A. 

      Risk Acceptance details

    • B. 

      Emergency Response guidelines

    • C. 

      Risk assessment

    • D. 

      Mobile Site plan

  • 16. 
    In what type of addressing scheme is the data actually supplied to the CPU as an argument?
    • A. 

      Direct addressing

    • B. 

      Immediate addressing

    • C. 

      Base+offset addressing

    • D. 

      Indirect addressing

  • 17. 
    What type of addressing scheme supplies the CPU with a location that contains the memory address of the actual operand?
    • A. 

      Direct addressing

    • B. 

      Immediate addressing

    • C. 

      Base+offset addressing

    • D. 

      Indirect addressing

  • 18. 
    In what type of addressing scheme is the actual address of the memory location provided to the CPU?
    • A. 

      Direct addressing

    • B. 

      Immediate addressing

    • C. 

      Base+offset addressing

    • D. 

      Indirect addressing

  • 19. 
    In what type of addressing scheme uses a value stored in one of the CPU’s registers as the base location to start counting?
    • A. 

      Direct addressing

    • B. 

      Immediate addressing

    • C. 

      Base+offset addressing

    • D. 

      Indirect addressing

  • 20. 
    Which one of the following is not a component of the DevOps model?
    • A. 

      Information security

    • B. 

      Software development

    • C. 

      Quality assurance

    • D. 

      IT operations

  • 21. 
    Used to manipulate line voltages to steal long-distance services.
    • A. 

      Black Box

    • B. 

      White Box

    • C. 

      Blue Box

    • D. 

      Red Box

  • 22. 
    Used to simulate tones of coins being deposited into a pay phone.
    • A. 

      Black Box

    • B. 

      White Box

    • C. 

      Blue Box

    • D. 

      Red Box

  • 23. 
    Used to simulate 2600 Hz tones to interact directly with telephone networktrunk systems.
    • A. 

      Black Box

    • B. 

      White Box

    • C. 

      Blue Box

    • D. 

      Red Box

  • 24. 
    Used to control the phone system.  A dual-tone multifrequency (DTMF) generator (that is, a keypad)
    • A. 

      Black Box

    • B. 

      White Box

    • C. 

      Blue Box

    • D. 

      Red Box

  • 25. 
    First generation languages.
    • A. 

      All Machine Languages

    • B. 

      All Assembly Languages

    • C. 

      All Complied Languages (C++, Java)

    • D. 

      Attempt to approximate natural languages, including SQL, used by databases

    • E. 

      Allows programmers to create code using visual interfaces