CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 2 ■ Asset Security (Domain 2) 41



  1. Major Hunter, a member of the armed forces, has been entrusted with information that, if
    exposed, could cause serious damage to national security. Under U.S. government classifi-
    cation standards, how should this data be classified?
    A. Unclassified
    B. Top S e c re t
    C. Confidential
    D. Secret

  2. When a computer is removed from service and disposed of, the process that ensures that
    all storage media has been removed or destroyed is known as what?
    A. Sanitization
    B. Purging
    C. Destruction
    D. Declassification

  3. Linux systems that use bcrypt are using a tool based on what DES alternative encryption
    scheme?
    A. 3DES
    B. AES
    C. Diffie–Hellman
    D. Blowfish

  4. Susan works in an organization that labels all removable media with the classification
    level of the data it contains, including public data. Why would Susan’s employer label all
    media instead of labeling only the media that contains data that could cause harm if it was
    exposed?
    A. It is cheaper to order all prelabeled media.
    B. It prevents sensitive media from not being marked by mistake.
    C. It prevents reuse of public media for sensitive data.
    D. Labeling all media is required by HIPAA.

  5. Data stored in RAM is best characterized as what type of data?


A. Data at rest
B. Data in use
C. Data in transit
D. Data at large
Free download pdf