Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Susan has been told by her boss that she will be replacing the current security manager inside her company. Her boss clarified to her that operational security measures have not been carried out in a standard design, so some systems have appropriate security configurations and a few don’t. Her boss should get it how dangerous it is to have a few of the frameworks misconfigured, besides what to do in this situation. which of the following is the best way for Susan to explain the dangers of the current arrangement problems to her boss?
Correct
Susan has to illustrate these vulnerabilities (misconfigured frameworks) within the context of risk to her boss. This implies she has to recognize the particular vulnerabilities, associate threats to those vulnerabilities, and calculate their dangers. This will allow her boss to understand how basic these issues are and what sort of activity ought to take put.
Incorrect
Susan has to illustrate these vulnerabilities (misconfigured frameworks) within the context of risk to her boss. This implies she has to recognize the particular vulnerabilities, associate threats to those vulnerabilities, and calculate their dangers. This will allow her boss to understand how basic these issues are and what sort of activity ought to take put.
-
Question 2 of 10
2. Question
Susan has been told by her boss that she will be supplanting the current security director inside her company. Her boss clarified to her that in a standard design, operational security measures were not carried out, so some systems have legal security arrangements and a few don’t. Her boss has to get it how dangerous it is to have some of the frameworks misconfigured, along with what to do in this situation. Which of the following one of the most likely arrangements that Susan will come up with and present to her boss?
Correct
Benchmarks have to be created that layout appropriate arrangement administration processes and endorsed standard arrangement settings. Once these benchmarks are created and put into put, at that point representatives can be prepared on these issues and how to actualize and maintain what is laid out within the benchmarks. Frameworks can be tried against what is laid out in the benchmarks, and frameworks can be monitored to distinguish if there are setups that do not meet the prerequisites sketched out within the measures. You may discover that a few CISSP questions seem subjective and their answers difficult to stick down. Questions that inquire what is “best” or “more likely” are common
Incorrect
Benchmarks have to be created that layout appropriate arrangement administration processes and endorsed standard arrangement settings. Once these benchmarks are created and put into put, at that point representatives can be prepared on these issues and how to actualize and maintain what is laid out within the benchmarks. Frameworks can be tried against what is laid out in the benchmarks, and frameworks can be monitored to distinguish if there are setups that do not meet the prerequisites sketched out within the measures. You may discover that a few CISSP questions seem subjective and their answers difficult to stick down. Questions that inquire what is “best” or “more likely” are common
-
Question 3 of 10
3. Question
What is one of the primary steps in creating a commerce continuity arrangement?
Correct
A trade affect examination incorporates distinguishing basic frameworks and capacities of a company and meeting agents from each division. Once management’s support is cemented, a commerce affect examination should be performed to distinguish the threats the company faces and the potential costs of these dangers.
Incorrect
A trade affect examination incorporates distinguishing basic frameworks and capacities of a company and meeting agents from each division. Once management’s support is cemented, a commerce affect examination should be performed to distinguish the threats the company faces and the potential costs of these dangers.
-
Question 4 of 10
4. Question
The purpose of initiating emergency methods right after a disaster takes place is to prevent misfortune of life and wounds, and to _______________.
Correct
The most objective of catastrophe recuperation and commerce progression plans is to mitigate all risks that can be experienced by a company. Emergency procedures first have to be carried out to ensure human life, and after that other methods got to be executed to diminish the damage from assist dangers
Incorrect
The most objective of catastrophe recuperation and commerce progression plans is to mitigate all risks that can be experienced by a company. Emergency procedures first have to be carried out to ensure human life, and after that other methods got to be executed to diminish the damage from assist dangers
-
Question 5 of 10
5. Question
Which of the following would you use to control the public distribution, reproduction, display, and adjustment of an original white paper composed by your staff?
Correct
Copyright fits the circumstance accurately. A novel innovation portrayed in the document could be used to ensure an obvious one, but the address did not infer that this was the case. A trade mystery cannot be freely spread, so it does not apply. At long last, a trademark protects as it were a word, image, sound, shape, color, or combination of these.
Incorrect
Copyright fits the circumstance accurately. A novel innovation portrayed in the document could be used to ensure an obvious one, but the address did not infer that this was the case. A trade mystery cannot be freely spread, so it does not apply. At long last, a trademark protects as it were a word, image, sound, shape, color, or combination of these.
-
Question 6 of 10
6. Question
Many privacy laws manage which of the taking after rules?
Correct
The Government Protection Act of 1974 and the European Union Standards on Protection were created to ensure citizens from government offices collect individual information. These acts have numerous stipulations, counting that the data can as it was being utilized for the reason for which it was collected.
Incorrect
The Government Protection Act of 1974 and the European Union Standards on Protection were created to ensure citizens from government offices collect individual information. These acts have numerous stipulations, counting that the data can as it was being utilized for the reason for which it was collected.
-
Question 7 of 10
7. Question
The term used to indicate a potential cause of an unwanted incident, which may result in harm to a system or organization is
Correct
The address gives the definition of risk in ISO/IEC 27000. The term attacker (option D) may well be utilized to depict a risk specialist that’s, in turn, a threat, but the use of this term is much more prohibitive. The most excellent reply may be a danger.
Incorrect
The address gives the definition of risk in ISO/IEC 27000. The term attacker (option D) may well be utilized to depict a risk specialist that’s, in turn, a threat, but the use of this term is much more prohibitive. The most excellent reply may be a danger.
-
Question 8 of 10
8. Question
A CISSP candidate signs a morals statement earlier to taking the CISSP examination. Which of the taking after would be a violation of the (ISC)2 Code of Morals that could cause the candidate to lose his or her certification?
Correct
A CISSP candidate and a CISSP holder ought to never examine with others what was on the exam. This corrupts the value of the exam to be utilized as an instrument to test someone’s true security information. On the off chance that this sort of movement is revealed, the individual might be stripped of their CISSP certification since this would damage the terms of the NDA which the applicant will enter before taking the test. Abusing an NDA could be an infringement of the ethics canon that requires CISSPs to act honorably, truly, legitimately, capably, and legitimately.
Incorrect
A CISSP candidate and a CISSP holder ought to never examine with others what was on the exam. This corrupts the value of the exam to be utilized as an instrument to test someone’s true security information. On the off chance that this sort of movement is revealed, the individual might be stripped of their CISSP certification since this would damage the terms of the NDA which the applicant will enter before taking the test. Abusing an NDA could be an infringement of the ethics canon that requires CISSPs to act honorably, truly, legitimately, capably, and legitimately.
-
Question 9 of 10
9. Question
Which of the following has an erroneous definition mapping?
i. Respectful (code) law: Based on past translations of laws
ii. Common law: Rule-based law, not precedent-based
iii. Standard law: Bargains primarily with individual conduct and designs of behavior
iv. Devout law: Based on devout convictions of the regionCorrect
The taking after has the right definition mappings:
i. Gracious (code) law: Rule-based law, not precedent-based
ii. Common law: Based on past translations of laws
iii. Standard law: Bargains basically with individual conduct and designs of behavior
iv. Devout law: Based on devout convictions of the localeIncorrect
The taking after has the right definition mappings:
i. Gracious (code) law: Rule-based law, not precedent-based
ii. Common law: Based on past translations of laws
iii. Standard law: Bargains basically with individual conduct and designs of behavior
iv. Devout law: Based on devout convictions of the locale -
Question 10 of 10
10. Question
Which of the following statements is true around the data life cycle?
Correct
In spite of the fact that different data life-cycle models exist, they all start with the creation or acquisition of the data and conclusion with its extreme transfer (ordinary annihilation).
Incorrect
In spite of the fact that different data life-cycle models exist, they all start with the creation or acquisition of the data and conclusion with its extreme transfer (ordinary annihilation).