Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISSP PRACTICE TESTS Chapter 1▪Security & Risk Management (Domain 1) 100 Q&A Verified Solution

Beoordeling
-
Verkocht
-
Pagina's
19
Cijfer
A+
Geüpload op
18-01-2023
Geschreven in
2022/2023

CISSP PRACTICE TESTS Chapter 1▪Security & Risk Management (Domain 1) 100 Q&A 1. What is the final step of quantitative? A. Determine asset value. B.Assess the annualized rate of occurrence. C. Derive the annualized loss expectancy. D. Conduct a cost/benefit analysis. D. Conduct a cost/benefit analysis. 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A. Spoofing B. Information disclosure C. Repudiation D. Tampering A. Spoofing 3. Under the Digital Millennium Copyright Act (DMCA), what type of offenses do not require prompt action by an Internet service provider after it receives a notification of infringement claim from a copyright holder? A. Storage of information by a customer on a provider's server B. Caching of information by the provider C. Transmission of information over the provider's network by a customer D. Caching of information in a provider search engine C. Transmission of information over the provider's network by a customer 4. FlyAway Travel has offices in both the European Union and the United States and transfers personal information between those offices regularly. Which of the seven requirements for processing personal information states that organizations must inform individuals about how the information they collect is used? A. Notice B. Choice C. Onward Transfer D. Enforcement A. Notice 5. Which one of the following is not one of the three common threat modeling techniques? A. Focused on assets B. Focused on attackers C. Focused on software D. Focused on social engineering D. Focused on social engineering 6. Which one of the following elements of information is not considered personally identifiable information that would trigger most US state data breach laws? A. Student identification number B. Social Security number

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CISSP PRACTICE TESTS Chapter 1▪Security & Risk
Management (Domain 1) 100 Q&A
1. What is the final step of quantitative?
A. Determine asset value.
B.Assess the annualized rate of occurrence.
C. Derive the annualized loss expectancy.
D. Conduct a cost/benefit analysis.
D. Conduct a cost/benefit analysis.
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized
network is an example of what category of threat?
A. Spoofing
B. Information disclosure
C. Repudiation
D. Tampering
A. Spoofing
3. Under the Digital Millennium Copyright Act (DMCA), what type of offenses do
not require prompt action by an Internet service provider after it receives a
notification of infringement claim from a copyright holder?
A. Storage of information by a customer on a provider's server
B. Caching of information by the provider
C. Transmission of information over the provider's network by a customer
D. Caching of information in a provider search engine
C. Transmission of information over the provider's network by a customer
4. FlyAway Travel has offices in both the European Union and the United States
and transfers personal information between those offices regularly. Which of the
seven requirements for processing personal information states that organizations
must inform individuals about how the information they collect is used?
A. Notice
B. Choice
C. Onward Transfer
D. Enforcement
A. Notice
5. Which one of the following is not one of the three common threat modeling
techniques?
A. Focused on assets
B. Focused on attackers
C. Focused on software
D. Focused on social engineering
D. Focused on social engineering
6. Which one of the following elements of information is not considered
personally identifiable information that would trigger most US state data breach
laws?
A. Student identification number
B. Social Security number

,C. Driver's license number
D. Credit card number
A. Student identification number
7. In 1991, the federal sentencing guidelines formalized a rule that requires senior
executives to take personal responsibility for information security matters. What
is the name of this rule?
A. Due dilidence rule
B. Personal liability rule
C. Prudent man rule
D. Due process rule
C. Prudent man rule
8. Which one of the following provides an authentication mechanism that would
be appropriate for pairing with a password to achieve multifactor authentication?
A. Username
B. PIN
C. Security question
D. Fingerprint scan
D. Fingerprint scan
9. What United States government agency is responsible for administering the
terms of safe harbor agreements between the European Union and the United
States under the EU Data Protection Directive?
A. Department of Defense
B. Department of the Treasury
C. State Department
D. Department of Commerce
D. Department of Commerce
10. Yolanda is the cheif privacy officer for a financial institution and is
researching privacy issues related to customer checking accounts. Which one of
the following laws is most likely to apply to this situation?
A. GLBA
B. SOX
C. HIPAA
D. FERPA
A. GLBA
11. Tim's organization recently recieved a contract to conduct sponsored
research as a government contractor. What law now likely applies to the
information system involved in this contract?
A. FISMA
B. PCI DSS
C. HIPAA
D. GISRA
A. FISMA
12. Chris is advising travelers from his organization who will be visiting many
different countries overseas. He is concerned about compliiance with export
control laws. Which of the following technologies is most likely to trigger these
regulations?

, A. Memory chips
B. Office productivity applications
C. Hard drives
D. Encryption software
D. Encryption software
13. Bobbi is investigating a security incident and discovers that an attacker
began with a normal user account but managed to exploit a system vulnerability
to provide that account with administrative rights. What type of attack took place
under the STRIDE model?
A. Spoofing
B. Repudiation
C. Tampering
D. Elevation of privilege
A. D. Elevation of privilege
14. You are completing your business continuity planning effort and have
decided that you wish to accept one of the risks. What should you do next?
A. Implement new security control to reduce the risk level.
B. Design a disaster recovery plan.
C. Repeat the business impact assessment.
D. Document your decision-making process.
D. Document your decision-making process.
15. Which one of the following control categories does not accurately describe a
fence around a facility?
A. Physical
B. Detective
C. Deterrent
D. Preventive
B. Detective
16. Tony is developing a business continuity plan and is having difficulty
prioritizing resources because of the difficulty of combining information about
tangible and intangible assets. What would be the most effective risk assessment
approach for him to use?
A. Quantitative risk assessment
B. Qualitative risk assessment
C. Neither quantitative nor qualitative risk assessment
D. Combination of quantitative and qualitative risk assessment
D. Combination of quantitative and qualitative risk assessment
17. What law provides intellectual property proctection to the holders of trade
secrets?
A. Copyright Law
B. Lanham Act
C. Glass-Steagall Act
D. Economic Espionage Act
D. Economic Espionage Act
18. Which one of the following principles imposes a standard of care upon an
individual that is broad and equivalent to what one would expect from a

Geschreven voor

Vak

Documentinformatie

Geüpload op
18 januari 2023
Aantal pagina's
19
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
magdamwikash23 Western Governers University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
114
Lid sinds
3 jaar
Aantal volgers
94
Documenten
5328
Laatst verkocht
1 dag geleden
Magda

NURSING STUDY GUIDES/EXAMS AND NOTES ALL VERIFIED BY EXPERTS All my uploaded documents, exams and essays are verified by relevant experts.I can assure an A or at least 90% if you use any of my documents.

3.9

14 beoordelingen

5
7
4
2
3
2
2
2
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen