CISSP Official Practice Tests by Mike Chapple, David Seidl
16 Chapter 1 ■ Security and Risk Management (Domain 1) Ben is seeking a control objective framework that is widely accepted aro ...
Chapter 1 ■ Security and Risk Management (Domain 1) 17 Which one of the following stakeholders is not typically included on a b ...
18 Chapter 1 ■ Security and Risk Management (Domain 1) The Domer Industries risk assessment team recently conducted a qualitati ...
Chapter 1 ■ Security and Risk Management (Domain 1) 19 C. 17 D. 18 Tom is considering locating a business in the downtown area ...
20 Chapter 1 ■ Security and Risk Management (Domain 1) You discover that a user on your network has been using the Wireshark to ...
Chapter 1 ■ Security and Risk Management (Domain 1) 21 Match the following numbered laws or industry standards to their lettere ...
22 Chapter 1 ■ Security and Risk Management (Domain 1) Which one of the following tools is most often used for identification p ...
Chapter 1 ■ Security and Risk Management (Domain 1) 23 Ryan is a security risk analyst for an insurance company. He is currentl ...
24 Chapter 1 ■ Security and Risk Management (Domain 1) John is analyzing an attack against his company in which the attacker fo ...
Chapter 1 ■ Security and Risk Management (Domain 1) 25 After completing the first year of his security awareness program, Charl ...
26 Chapter 1 ■ Security and Risk Management (Domain 1) Which of the following is not typically part of a termination process? A ...
Asset Security (Domain 2) Chapter 2 ...
28 Chapter 2 ■ Asset Security (Domain 2) Angela is an information security architect at a bank and has been assigned to ensure ...
Chapter 2 ■ Asset Security (Domain 2) 29 Staff in an information technology (IT) department who are delegated responsibility fo ...
30 Chapter 2 ■ Asset Security (Domain 2) What term describes data that remains after attempts have been made to remove the data ...
Chapter 2 ■ Asset Security (Domain 2) 31 C. Expensive media is easier to encrypt. D. More expensive media typically improves dat ...
32 Chapter 2 ■ Asset Security (Domain 2) Adjusting the CIS benchmarks to your organization’s mission and your specific IT syste ...
Chapter 2 ■ Asset Security (Domain 2) 33 C. Decryption D. Loss of data integrity Full disk encryption like Microsoft’s BitLocke ...
34 Chapter 2 ■ Asset Security (Domain 2) Which of the following is the least effective method of removing data from media? A. D ...
Chapter 2 ■ Asset Security (Domain 2) 35 What encryption technology would be appropriate for HIPAA documents in transit? A. Bi ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf