ExamGecko
Home Home / ISC / CISSP

ISC CISSP Practice Test - Questions Answers

Question list
Search
Search

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

A.
determine the risk of a business interruption occurring
A.
determine the risk of a business interruption occurring
Most voted
Answers (1)
Most voted
B.
determine the technological dependence of the business processes
B.
determine the technological dependence of the business processes
Answers
C.
Identify the operational impacts of a business interruption
C.
Identify the operational impacts of a business interruption
Answers
D.
Identify the financial impacts of a business interruption
D.
Identify the financial impacts of a business interruption
Answers
Suggested answer: B

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?

A.
Examine the device for physical tampering
A.
Examine the device for physical tampering
Answers
B.
Implement more stringent baseline configurations
B.
Implement more stringent baseline configurations
Answers
C.
Purge or re-image the hard disk drive
C.
Purge or re-image the hard disk drive
Answers
D.
Change access codes
D.
Change access codes
Answers
Suggested answer: D

Which of the following represents the GREATEST risk to data confidentiality?

A.
Network redundancies are not implemented
A.
Network redundancies are not implemented
Answers
B.
Security awareness training is not completed
B.
Security awareness training is not completed
Answers
C.
Backup tapes are generated unencrypted
C.
Backup tapes are generated unencrypted
Answers
D.
Users have administrative privileges
D.
Users have administrative privileges
Answers
Suggested answer: C

What is the MOST important consideration from a data security perspective when an organization plans to relocate?

A.
Ensure the fire prevention and detection systems are sufficient to protect personnel
A.
Ensure the fire prevention and detection systems are sufficient to protect personnel
Answers
B.
Review the architectural plans to determine how many emergency exits are present
B.
Review the architectural plans to determine how many emergency exits are present
Answers
C.
Conduct a gap analysis of a new facilities against existing security requirements
C.
Conduct a gap analysis of a new facilities against existing security requirements
Answers
D.
Revise the Disaster Recovery and Business Continuity (DR/BC) plan
D.
Revise the Disaster Recovery and Business Continuity (DR/BC) plan
Answers
Suggested answer: C

A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the IT manager be concerned with?

A.
Application
A.
Application
Answers
B.
Storage
B.
Storage
Answers
C.
Power
C.
Power
Answers
D.
Network
D.
Network
Answers
Suggested answer: C

When assessing an organization's security policy according to standards established by the International Organization for Standardization (ISO) 27001 and 27002, when can management responsibilities be defined?

A.
Only when assets are clearly defined
A.
Only when assets are clearly defined
Answers
B.
Only when standards are defined
B.
Only when standards are defined
Answers
C.
Only when controls are put in place
C.
Only when controls are put in place
Answers
D.
Only procedures are defined
D.
Only procedures are defined
Answers
Suggested answer: A

Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?

A.
Install mantraps at the building entrances
A.
Install mantraps at the building entrances
Answers
B.
Enclose the personnel entry area with polycarbonate plastic
B.
Enclose the personnel entry area with polycarbonate plastic
Answers
C.
Supply a duress alarm for personnel exposed to the public
C.
Supply a duress alarm for personnel exposed to the public
Answers
D.
Hire a guard to protect the public area
D.
Hire a guard to protect the public area
Answers
Suggested answer: D

An important principle of defense in depth is that achieving information security requires a balanced focus on which PRIMARY elements?

A.
Development, testing, and deployment
A.
Development, testing, and deployment
Answers
B.
Prevention, detection, and remediation
B.
Prevention, detection, and remediation
Answers
C.
People, technology, and operations
C.
People, technology, and operations
Answers
D.
Certification, accreditation, and monitoring
D.
Certification, accreditation, and monitoring
Answers
Suggested answer: C

Intellectual property rights are PRIMARY concerned with which of the following?

A.
Owner's ability to realize financial gain
A.
Owner's ability to realize financial gain
Answers
B.
Owner's ability to maintain copyright
B.
Owner's ability to maintain copyright
Answers
C.
Right of the owner to enjoy their creation
C.
Right of the owner to enjoy their creation
Answers
D.
Right of the owner to control delivery method
D.
Right of the owner to control delivery method
Answers
Suggested answer: C

Which of the following is MOST important when assigning ownership of an asset to a department?

A.
The department should report to the business owner
A.
The department should report to the business owner
Answers
B.
Ownership of the asset should be periodically reviewed
B.
Ownership of the asset should be periodically reviewed
Answers
C.
Individual accountability should be ensured
C.
Individual accountability should be ensured
Answers
D.
All members should be trained on their responsibilities
D.
All members should be trained on their responsibilities
Answers
Suggested answer: D
Total 1.482 questions
Go to page: of 149