CISSP Official Practice Tests by Mike Chapple, David Seidl
36 Chapter 2 ■ Asset Security (Domain 2) Chris is responsible for his organization’s security standards and has guided the sele ...
Chapter 2 ■ Asset Security (Domain 2) 37 Joe works at a major pharmaceutical research and development company and has been task ...
38 Chapter 2 ■ Asset Security (Domain 2) Ben is following the National Institute of Standards and Technology (NIST) Special Pub ...
Chapter 2 ■ Asset Security (Domain 2) 39 C. Purge, document, validate D. Purge, validate, document What methods are often used ...
40 Chapter 2 ■ Asset Security (Domain 2) If Chris is one of the data owners for the organization, what steps in this process is ...
Chapter 2 ■ Asset Security (Domain 2) 41 Major Hunter, a member of the armed forces, has been entrusted with information that, ...
42 Chapter 2 ■ Asset Security (Domain 2) 6 7. What issue is the validation portion of the NIST SP 800-88 sample certificate of s ...
Chapter 2 ■ Asset Security (Domain 2) 43 C. It is more expensive than new media and may still fail. D. Clearing is required firs ...
44 Chapter 2 ■ Asset Security (Domain 2) NIST SP 800-60 provides a process shown in the following diagram to assess information ...
Chapter 2 ■ Asset Security (Domain 2) 45 Which letters on this diagram are locations where you might find data at rest? A. A, ...
46 Chapter 2 ■ Asset Security (Domain 2) Which one of the following is not considered PII under U.S. federal government regulat ...
Chapter 2 ■ Asset Security (Domain 2) 47 For questions 86–88, please refer to the following scenario: As shown in the following ...
48 Chapter 2 ■ Asset Security (Domain 2) Susan’s organization performs a zero fill on hard drives before they are sent to a thi ...
Chapter 2 ■ Asset Security (Domain 2) 49 Which California law requires conspicuously posted privacy policies on commercial web- ...
50 Chapter 2 ■ Asset Security (Domain 2) Which mapping correctly matches data classifications between nongovernment and governm ...
Security Architecture and Engineering (Domain 3) Chapter 3 ...
52 Chapter 3 ■ Security Architecture and Engineering (Domain 3) Matthew is the security administrator for a consulting firm and ...
Chapter 3 ■ Security Architecture and Engineering (Domain 3) 53 Ralph is designing a physical security infrastructure for a new ...
54 Chapter 3 ■ Security Architecture and Engineering (Domain 3) Michael is responsible for forensic investigations and is inves ...
Chapter 3 ■ Security Architecture and Engineering (Domain 3) 55 A. Simple Security Property B. Simple Integrity Property C. *-Se ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf