CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 2 ■ Asset Security (Domain 2) 37



  1. Joe works at a major pharmaceutical research and development company and has been
    tasked with writing his organization’s data retention policy. As part of its legal require-
    ments, the organization must comply with the U.S. Food and Drug Administration’s Code
    of Federal Regulations Title 21. To do so, it is required to retain records with electronic
    signatures. Why would a signature be part of a retention requirement?
    A. It ensures that someone has reviewed the data.
    B. It provides confidentiality.
    C. It ensures that the data has not been changed.
    D. It validates who approved the data.

  2. What protocol is preferred over Telnet for remote server administration via the command
    line?
    A. SCP
    B. SFTP
    C. WDS
    D. SSH

  3. What method uses a strong magnetic field to erase media?


A. Magwipe
B. Degaussing
C. Sanitization
D. Purging


  1. Steve is concerned about the fact that employees leaving his organization were often privy
    to proprietary information. Which one of the following controls is most effective against
    this threat?
    A. Sanitization
    B. NDAs
    C. Clearing
    D. Encryption

  2. Alex works for a government agency that is required to meet U.S. federal government
    requirements for data security. To meet these requirements, Alex has been tasked with
    making sure data is identifiable by its classification level. What should Alex do to the
    data?
    A. Classify the data.
    B. Encrypt the data.
    C. Label the data.
    D. Apply DRM to the data.

Free download pdf