Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CISSP PRACTICE TESTS Chapter 1▪Security & Risk Management (Domain 1) 100 Q&A Verified Solution

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
25-10-2022
Written in
2022/2023

CISSP PRACTICE TESTS Chapter 1▪Security & Risk Management (Domain 1) 100 Q&A 1. What is the final step of quantitative? A. Determine asset value. B.Assess the annualized rate of occurrence. C. Derive the annualized loss expectancy. D. Conduct a cost/benefit analysis. D. Conduct a cost/benefit analysis. 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A. Spoofing B. Information disclosure C. Repudiation D. Tampering A. Spoofing 3. Under the Digital Millennium Copyright Act (DMCA), what type of offenses do not require prompt action by an Internet service provider after it receives a notification of infringement claim from a copyright holder? A. Storage of information by a customer on a provider's server B. Caching of information by the provider C. Transmission of information over the provider's network by a customer D. Caching of information in a provider search engine C. Transmission of information over the provider's network by a customer 4. FlyAway Travel has offices in both the European Union and the United States and transfers personal information between those offices regularly. Which of the seven requirements for processing personal information states that organizations must inform individuals about how the information they collect is used? A. Notice B. Choice C. Onward Transfer D. Enforcement A. Notice 5. Which one of the following is not one of the three common threat modeling techniques? A. Focused on assets B. Focused on attackers C. Focused on software D. Focused on social engineering D. Focused on social engineering 6. Which one of the following elements of information is not considered personally identifiable information that would trigger most US state data breach laws? A. Student identification number B. Social Security number

Show more Read less
Institution
Course

Content preview

CISSP PRACTICE TESTS Chapter 1▪Security & Risk
Management (Domain 1) 100 Q&A
1. What is the final step of quantitative?
A. Determine asset value.
B.Assess the annualized rate of occurrence.
C. Derive the annualized loss expectancy.
D. Conduct a cost/benefit analysis.
D. Conduct a cost/benefit analysis.
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized
network is an example of what category of threat?
A. Spoofing
B. Information disclosure
C. Repudiation
D. Tampering
A. Spoofing
3. Under the Digital Millennium Copyright Act (DMCA), what type of offenses do
not require prompt action by an Internet service provider after it receives a
notification of infringement claim from a copyright holder?
A. Storage of information by a customer on a provider's server
B. Caching of information by the provider
C. Transmission of information over the provider's network by a customer
D. Caching of information in a provider search engine
C. Transmission of information over the provider's network by a customer
4. FlyAway Travel has offices in both the European Union and the United States
and transfers personal information between those offices regularly. Which of the
seven requirements for processing personal information states that organizations
must inform individuals about how the information they collect is used?
A. Notice
B. Choice
C. Onward Transfer
D. Enforcement
A. Notice
5. Which one of the following is not one of the three common threat modeling
techniques?
A. Focused on assets
B. Focused on attackers
C. Focused on software
D. Focused on social engineering
D. Focused on social engineering
6. Which one of the following elements of information is not considered
personally identifiable information that would trigger most US state data breach
laws?
A. Student identification number
B. Social Security number

,C. Driver's license number
D. Credit card number
A. Student identification number
7. In 1991, the federal sentencing guidelines formalized a rule that requires senior
executives to take personal responsibility for information security matters. What
is the name of this rule?
A. Due dilidence rule
B. Personal liability rule
C. Prudent man rule
D. Due process rule
C. Prudent man rule
8. Which one of the following provides an authentication mechanism that would
be appropriate for pairing with a password to achieve multifactor authentication?
A. Username
B. PIN
C. Security question
D. Fingerprint scan
D. Fingerprint scan
9. What United States government agency is responsible for administering the
terms of safe harbor agreements between the European Union and the United
States under the EU Data Protection Directive?
A. Department of Defense
B. Department of the Treasury
C. State Department
D. Department of Commerce
D. Department of Commerce
10. Yolanda is the cheif privacy officer for a financial institution and is
researching privacy issues related to customer checking accounts. Which one of
the following laws is most likely to apply to this situation?
A. GLBA
B. SOX
C. HIPAA
D. FERPA
A. GLBA
11. Tim's organization recently recieved a contract to conduct sponsored
research as a government contractor. What law now likely applies to the
information system involved in this contract?
A. FISMA
B. PCI DSS
C. HIPAA
D. GISRA
A. FISMA
12. Chris is advising travelers from his organization who will be visiting many
different countries overseas. He is concerned about compliiance with export
control laws. Which of the following technologies is most likely to trigger these
regulations?

, A. Memory chips
B. Office productivity applications
C. Hard drives
D. Encryption software
D. Encryption software
13. Bobbi is investigating a security incident and discovers that an attacker
began with a normal user account but managed to exploit a system vulnerability
to provide that account with administrative rights. What type of attack took place
under the STRIDE model?
A. Spoofing
B. Repudiation
C. Tampering
D. Elevation of privilege
A. D. Elevation of privilege
14. You are completing your business continuity planning effort and have
decided that you wish to accept one of the risks. What should you do next?
A. Implement new security control to reduce the risk level.
B. Design a disaster recovery plan.
C. Repeat the business impact assessment.
D. Document your decision-making process.
D. Document your decision-making process.
15. Which one of the following control categories does not accurately describe a
fence around a facility?
A. Physical
B. Detective
C. Deterrent
D. Preventive
B. Detective
16. Tony is developing a business continuity plan and is having difficulty
prioritizing resources because of the difficulty of combining information about
tangible and intangible assets. What would be the most effective risk assessment
approach for him to use?
A. Quantitative risk assessment
B. Qualitative risk assessment
C. Neither quantitative nor qualitative risk assessment
D. Combination of quantitative and qualitative risk assessment
D. Combination of quantitative and qualitative risk assessment
17. What law provides intellectual property proctection to the holders of trade
secrets?
A. Copyright Law
B. Lanham Act
C. Glass-Steagall Act
D. Economic Espionage Act
D. Economic Espionage Act
18. Which one of the following principles imposes a standard of care upon an
individual that is broad and equivalent to what one would expect from a

Written for

Course

Document information

Uploaded on
October 25, 2022
Number of pages
19
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ACADEMICAIDSTORE Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
1212
Member since
4 year
Number of followers
892
Documents
12020
Last sold
3 days ago
ACADEMICAID STORE

Welcome to ACADEMICAID store! We specialize in reliable test banks, exam questions with verified answers, practice exams, study guides, and complete exam review materials to help students pass on the first try. Our uploads support Nursing programs, professional certifications, business courses, accounting classes, and college-level exams. All documents are well-organized, accurate, exam-focused, and easy to follow, making them ideal for quizzes, midterms, finals, ATI & HESI prep, NCLEX-style practice, certification exams, and last-minute reviews. If you’re looking for trusted test banks, comprehensive exam prep, and time-saving study resources, you’re in the right place.

Read more Read less
4.1

176 reviews

5
98
4
29
3
28
2
6
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions