CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 2 ■ Asset Security (Domain 2) 45



  1. Which letters on this diagram are locations where you might find data at rest?


A. A, B, and C
B. C and E
C. A and E
D. B, D, and F


  1. What would be the best way to secure data at points B, D, and F?


A. AES-256
B. SSL
C. TLS
D. 3DES

7 7. What is the best way to secure files that are sent from workstation A via the internet
service (C) to remote server E?
A. Use AES at rest at point A, and use TLS in transit via B and D.
B. Encrypt the data files and send them.
C. Use 3DES and TLS to provide double security.
D. Use full disk encryption at A and E, and use SSL at B and D.



  1. Susan needs to provide a set of minimum security requirements for email. What steps
    should she recommend for her organization to ensure that the email remains secure?
    A. All email should be encrypted.
    B. All email should be encrypted and labeled.
    C. Sensitive email should be encrypted and labeled.
    D. Only highly sensitive email should be encrypted.

  2. What term describes the process of reviewing baseline security controls and selecting only
    the controls that are appropriate for the IT system you are trying to protect?
    A. Standard creation
    B. CIS benchmarking
    C. Baselining
    D. Scoping

  3. What data role does a system that is used to process data have?


A. Mission owner
B. Data owner
C. Data processor
D. Custodian
Free download pdf