CISSP Practice Exam

Website design By BotEap.comCISSP Practice Exam

Website design By BotEap.comCertified Information Systems Security Professional

Website design By BotEap.comAfter studying the textbooks, it is important to test your newly acquired knowledge and see how well you have absorbed the material. practice exams…

Website design By BotEap.com* Reinforce what you learned: fill in the blanks of what you missed

Website design By BotEap.com* Get used to answering questions to build trust and familiarity

Website design By BotEap.comHere are 10 multiple choice exam questions for you to practice:

Website design By BotEap.com______________________________

Website design By BotEap.comQuestion 1# – What risk management methodology uses the exposure factor multiplied by the value of the asset to determine its result?

Website design By BotEap.comA. Annualized loss expectation

Website design By BotEap.comB. Single Loss Expectation

Website design By BotEap.comC. Annualized occurrence rate

Website design By BotEap.comD. Information risk management

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 2#: Which of the following is *NOT* a symmetric key algorithm?

Website design By BotEap.comA.) puffer fish

Website design By BotEap.comB.) Digital Signature Standard (DSS)

Website design By BotEap.comC.) Triple DES (3DES)

Website design By BotEap.comD.) RC5

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 3# – In relation to information security, availability is opposed to which of the following?

Website design By BotEap.comA. Delegation

Website design By BotEap.comB. Distribution

Website design By BotEap.comC. Documentation

Website design By BotEap.comD. Destruction

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 4#: Why should organizations enforce segregation of duties?

Website design By BotEap.comA. Ensures compliance with federal union standards

Website design By BotEap.comB. Helps verify that all employees know their job duties.

Website design By BotEap.comC. Provides a better work environment

Website design By BotEap.comD. Encourage collusion

Website design By BotEap.comE. Considered valuable in fraud detection

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 5# – Which of the following is most concerned about the safety of staff?

Website design By BotEap.comA. Management controls

Website design By BotEap.comB. Operational controls

Website design By BotEap.comC. Technical controls

Website design By BotEap.comD. Human resource controls.

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 6# – Which of the following devices could be used to commit telecommunications fraud using the “shoulder surfing” technique?

Website design By BotEap.comA. Magnetic stripe copy

Website design By BotEap.comtone generator b.

Website design By BotEap.comC tone recorder.

Website design By BotEap.comD. Video recorder

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 7# – What are database views used for?

Website design By BotEap.comA. To ensure referential integrity.

Website design By BotEap.comB. To allow easier access to data in a database.

Website design By BotEap.comC. To restrict user access to data in a database.

Website design By BotEap.comD. To provide audit trails.

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 8# – Which of the following services is not provided by the Digital Signature Standard (DSS)?

Website design By BotEap.comA.) Encryption

Website design By BotEap.comB.) Integrity

Website design By BotEap.comC.) Digital signature

Website design By BotEap.comD.) Authentication

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 9# – Which of the following describes a covert weather channel?

Website design By BotEap.comA. Modulated to carry an unintended information signal that can only be detected by special sensitive receptors.

Website design By BotEap.comB. Used by a supervisor to monitor a user’s productivity without their knowledge.

Website design By BotEap.comC. Provides the time trigger to activate a malicious program disguised as a legitimate function.

Website design By BotEap.comD. It allows one process to send information to another by modulating its own use of system resources.

Website design By BotEap.com_____________________

Website design By BotEap.comQuestion 10#: Valuable paper insurance coverage does not cover damage to which of the following?

Website design By BotEap.comA.) Registered, printed and written documents

Website design By BotEap.comB.) Manuscripts

Website design By BotEap.comC.) Records

Website design By BotEap.comD.) Money and Securities

Website design By BotEap.com_____________________

Website design By BotEap.comANSWERS

Website design By BotEap.comQuestion 1# – Correct answers: B

Website design By BotEap.comQuestion 2# – Correct answers: B

Website design By BotEap.comQuestion 3# – Correct answers: D

Website design By BotEap.comQuestion 4# – Correct answers: E

Website design By BotEap.comQuestion 5# – Correct answers: B

Website design By BotEap.comQuestion 6# – Correct answers: C

Website design By BotEap.comQuestion 7# – Correct answers: C

Website design By BotEap.comQuestion 8# – Correct answers: A

Website design By BotEap.comQuestion 9# – Correct answers: D

Website design By BotEap.comQuestion 10# – Correct answers: D

Website design By BotEap.com________________________________________________________

Leave a Reply

Your email address will not be published. Required fields are marked *