Cissp Q1
Cissp Q1
Which of the following roles is BEST to decide the data classification under which that
data is categorized?
Which of the following BEST describes the basic components of an information security
program policy document?
From a security perspective, which of the following assumptions MUST be made about
input to an application?
O It is verified.
O It is logged.
O It is tested.
O It is untrusted.
Which of the following is the BEST method of destroying data in order to render the
media unusable for future applications?
O Shredding
O Sanitization
O Deletion
O Degaussing
O It can be used to host content in locations closer to the end user to reduce latency.
O The network locations are connected by low bandwidth links, which reduces the cost to
implement it.
O It can be used to stream media when an organization has no need for geographic
restrictions.
O The infrastructure is leveraged with other application servers, which decreases the risk
of downtime.
Which of the following defines the technologies and protocols that allow credentials to
be used across multiple security domains?
O OpenID
O Security Assertion Markup Language (SAML)
O Multi-Factor Authentication (MFA)
O Federated Identity Management (FIM)
Which of the following describes a required dependency found in polyinstantiation?
Which of the following is the BEST way to identify false positives in a security audit?
O Manual analysis
O Automated analysis
O Root cause analysis
O Tool-based analysis
After a contract is in place for a software acquisition, which of the following can the
organization do to MINIMIZE the risks of the acquired software?
While searching for malicious internet traffic, a proxy engineer has difficulty scanning
Hypertext Transfer Protocol Secure (HTTPS) communication due to the encryption. How
can the engineer BEST solve this problem?
O Pinning
O Degaussing
O Single-pass wipe
O Multi-pass wipes
O Ensure the new employee completes an extensive security awareness training exercise.
O Require the new employee reviews all corporate security policies and procedures
immediately.
O Ensure the new employee understands the importance of security and their role in
security within the organization.
O Require the new employee immediately use Two Factor Authentication (2FA).
O Monitoring
O Storage
O Memory
O Pipe
After a recent failure to deliver an order fulfillment goal, the Chief Information Officer
(CIO) has been asked to implement new Key Performance Indicators (KPI) and Key Risk
Indicators (KRI). Which of the following is a KRI?
What type of attributes does the Attribute Based Access Control (ABAC) model use to
evaluate access rules?
Which of the following risks could occur with an external enterprise patch management
tool?
An application team is running tests to ensure that user entry fields will not accept
invalid input of any length. What type of negative testing is this an example of?
O Session testing
O Reasonable data
O Allowed number of characters
O Population of required fields
The acquisition of personal data being obtained by a lawful and fair means is an
example of what principle?
O Inheritance
O Encapsulation
O Polymorphism
O Polyinstantiation