CISSP Practice Exam
Website design By BotEap.comCISSP Practice Exam
Website design By BotEap.comCertified Information Systems Security Professional
Website design By BotEap.comAfter studying the textbooks, it is important to test your newly acquired knowledge and see how well you have absorbed the material. practice exams…
Website design By BotEap.com* Reinforce what you learned: fill in the blanks of what you missed
Website design By BotEap.com* Get used to answering questions to build trust and familiarity
Website design By BotEap.comHere are 10 multiple choice exam questions for you to practice:
Website design By BotEap.com______________________________
Website design By BotEap.comQuestion 1# – What risk management methodology uses the exposure factor multiplied by the value of the asset to determine its result?
Website design By BotEap.comA. Annualized loss expectation
Website design By BotEap.comB. Single Loss Expectation
Website design By BotEap.comC. Annualized occurrence rate
Website design By BotEap.comD. Information risk management
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 2#: Which of the following is *NOT* a symmetric key algorithm?
Website design By BotEap.comA.) puffer fish
Website design By BotEap.comB.) Digital Signature Standard (DSS)
Website design By BotEap.comC.) Triple DES (3DES)
Website design By BotEap.comD.) RC5
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 3# – In relation to information security, availability is opposed to which of the following?
Website design By BotEap.comA. Delegation
Website design By BotEap.comB. Distribution
Website design By BotEap.comC. Documentation
Website design By BotEap.comD. Destruction
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 4#: Why should organizations enforce segregation of duties?
Website design By BotEap.comA. Ensures compliance with federal union standards
Website design By BotEap.comB. Helps verify that all employees know their job duties.
Website design By BotEap.comC. Provides a better work environment
Website design By BotEap.comD. Encourage collusion
Website design By BotEap.comE. Considered valuable in fraud detection
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 5# – Which of the following is most concerned about the safety of staff?
Website design By BotEap.comA. Management controls
Website design By BotEap.comB. Operational controls
Website design By BotEap.comC. Technical controls
Website design By BotEap.comD. Human resource controls.
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 6# – Which of the following devices could be used to commit telecommunications fraud using the “shoulder surfing” technique?
Website design By BotEap.comA. Magnetic stripe copy
Website design By BotEap.comtone generator b.
Website design By BotEap.comC tone recorder.
Website design By BotEap.comD. Video recorder
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 7# – What are database views used for?
Website design By BotEap.comA. To ensure referential integrity.
Website design By BotEap.comB. To allow easier access to data in a database.
Website design By BotEap.comC. To restrict user access to data in a database.
Website design By BotEap.comD. To provide audit trails.
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 8# – Which of the following services is not provided by the Digital Signature Standard (DSS)?
Website design By BotEap.comA.) Encryption
Website design By BotEap.comB.) Integrity
Website design By BotEap.comC.) Digital signature
Website design By BotEap.comD.) Authentication
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 9# – Which of the following describes a covert weather channel?
Website design By BotEap.comA. Modulated to carry an unintended information signal that can only be detected by special sensitive receptors.
Website design By BotEap.comB. Used by a supervisor to monitor a user’s productivity without their knowledge.
Website design By BotEap.comC. Provides the time trigger to activate a malicious program disguised as a legitimate function.
Website design By BotEap.comD. It allows one process to send information to another by modulating its own use of system resources.
Website design By BotEap.com_____________________
Website design By BotEap.comQuestion 10#: Valuable paper insurance coverage does not cover damage to which of the following?
Website design By BotEap.comA.) Registered, printed and written documents
Website design By BotEap.comB.) Manuscripts
Website design By BotEap.comC.) Records
Website design By BotEap.comD.) Money and Securities
Website design By BotEap.com_____________________
Website design By BotEap.comANSWERS
Website design By BotEap.comQuestion 1# – Correct answers: B
Website design By BotEap.comQuestion 2# – Correct answers: B
Website design By BotEap.comQuestion 3# – Correct answers: D
Website design By BotEap.comQuestion 4# – Correct answers: E
Website design By BotEap.comQuestion 5# – Correct answers: B
Website design By BotEap.comQuestion 6# – Correct answers: C
Website design By BotEap.comQuestion 7# – Correct answers: C
Website design By BotEap.comQuestion 8# – Correct answers: A
Website design By BotEap.comQuestion 9# – Correct answers: D
Website design By BotEap.comQuestion 10# – Correct answers: D
Website design By BotEap.com________________________________________________________