CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 2 ■ Asset Security (Domain 2) 39


C. Purge, document, validate
D. Purge, validate, document


  1. What methods are often used to protect data in transit?


A. Telnet, ISDN, UDP
B. BitLocker, FileVault
C. AES, Serpent, IDEA
D. TLS, VPN, IPSec


  1. Which one of the following data roles bears ultimate organizational responsibility
    for data?
    A. System owners
    B. Business owners
    C. Data owners
    D. Mission owners

  2. What U.S. government agency oversees compliance with the Privacy Shield framework for
    organizations wishing to use the personal data of EU citizens?
    A. The FA A
    B. The FDA
    C. The DoD
    D. The Department of Commerce


For questions 57–59, please refer to the following scenario:

Chris has recently been hired into a new organization. The organization that Chris
belongs to uses the following classification process:


  1. Criteria are set for classifying data.

  2. Data owners are established for each type of data.

  3. Data is classified.

  4. Required controls are selected for each classification.

  5. Baseline security standards are selected for the organization.

  6. Controls are scoped and tailored.

  7. Controls are applied and enforced.

  8. Access is granted and managed.

Free download pdf