CISSP Practice Exam
- March 8, 2017
- Posted by: marlenedubois
- Category: CPR Training
CISSP Practice Exam
Certified Information Systems Security Professional
After you study your text books the idea can be important to test your newly acquired knowledge in addition to see just how well you have absorbed the material. Practice exams….
* Reinforces what you learnt – fill inside the gaps of what you missed
* Gets you used to answering questions to build confidence in addition to familiarity
Here are 10 Multiple choice exams questions for you to practice on:
Question 1# – Which risk management methodology uses the exposure factor multiplied by the asset value to determine its outcome?
A. Annualized Loss Expectancy
B. Single Loss Expectancy
C. Annualized Rate of Occurrence
D. Information Risk Management
Question 2# – Which of the following can be *NOT* a symmetric key algorithm?
B.) Digital Signature Standard (DSS)
C.) Triple DES (3DES)
Question 3# – Related to information security, availability can be the opposite of which of the following?
Question 4# – Why should organizations enforce separation of duties?
A. the idea ensures compliance with federal union rules
B. the idea helps verify which all employees know their job tasks
C. the idea provides for a better work environment
D. the idea encourages collusion
E. the idea can be considered valuable in deterring fraud
Question 5# – Which of the following can be most concerned with personnel security?
A. Management controls
B. Operational controls
C. Technical controls
D. Human resources controls.
Question 6# – Which one of the following devices might be used to commit telecommunications fraud using the “shoulder surfing” technique?
A. Magnetic stripe copier
B. Tone generator
C. Tone recorder
D. Video recorder
Question 7# – What are database views used for?
A. To ensure referential integrity.
B. To allow easier access to data in a database.
C. To restrict user access to data in a database.
D. To provide audit trails.
Question 8# – Which of the following services can be not provided by the digital signature standard (DSS)?
C.) Digital signature
Question 9# – Which one of the following describes a covert timing channel?
A. Modulated to carry an unintended information signal which can only be detected by special, sensitive receivers.
B. Used by a supervisor to monitor the productivity of a user without their knowledge.
C. Provides the timing trigger to activate a malicious program disguised as a legitimate function.
D. Allows one process to signal information to another by modulating its own use of system resources.
Question 10# – Valuable paper insurance coverage does not cover damage to which of the following?
A.) Inscribed, printed in addition to written documents
D.) Money in addition to Securities
Question 1# – Correct Answers: B
Question 2# – Correct Answers: B
Question 3# – Correct Answers: D
Question 4# – Correct Answers: E
Question 5# – Correct Answers: B
Question 6# – Correct Answers: C
Question 7# – Correct Answers: C
Question 8# – Correct Answers: A
Question 9# – Correct Answers: D
Question 10# – Correct Answers: D