CISSP Flashcards
Which business continuity document is a functional analysis that lists the critical and necessary business functions, their resource dependencies, and their level of criticality to the overall organization?
Business Impact Analysis (BIA)
A business impact analysis (BIA) is a functional analysis that lists the critical and necessary business functions, their resource dependencies, and their level of criticality to the overall organization.
Which business continuity document considers all aspects that are affected by a disaster, including functions, systems, personnel, and facilities, and lists and prioritizes the services that are needed?
Business Continuity Plan (BCP)
The business continuity plan (BCP) considers all aspects that are affected by a disaster, including functions, systems, personnel, and facilities, and lists and prioritizes the services that are needed.
What is the first step of business continuity?
Develop the continuity planning policy statement.
The first step of business continuity is to develop the continuity planning policy statement. All the other listed statements should be completed only after the continuity planning policy statement has been written.
In which phase of embedded device analysis are checksums utilized?
Preservation
Preservation: Focuses on preserving original artifacts in a way that is reliable, complete, accurate, and verifiable.
Management has decided that your organization needs to implement an alternative site. Although it is willing to allocate some funds to provide an infrastructure for the site, it cannot allocate enough funds to place computers at the new facility. Which site should you implement?
Warm Site
A warm site contains telecommunications equipment but no computers and is cheaper than a hot site but more expensive than a cold site. It takes longer to recover than a hot site but shorter to recover than a cold site.
What is the purpose of an account lockout policy?
An account lockout policy ensures that an account can no longer be used after a certain number of unsuccessful login attempts.
Your organization needs an alternative facility that will enable the organization to recover as quickly as possible. Management is willing to allocate substantial monetary resources for this. Which site should you implement?
Hot Site
You should implement a hot site because this site will allow you to recovery as quickly as possible.
Which document is an agreement between a software vendor and a business customer, such as a company or organization, specifying terms of use?
Software License Agreement
Software license agreement: An agreement between a software vendor and a business customer specifying terms of use.
Which statement BEST describes the Internet Engineering Task Force (IETF)?
The Internet Engineering Task Force (IETF) is a group dedicated to making the Internet better.
Which of the following is a series of actions or steps taken in order to achieve a particular end?
Process
A process is a series of actions or steps taken in order to achieve a particular end. Organizations will define individual processes and their relationship to one another
Which of the following is a system-specific policy?
Database Server Security Policy
A database server security policy is a system-specific policy because it covers a specific set of systems. All the other listed policies are issue-specific policies.
Which RFC is called Ethics and the Internet?
RFC 1087
RFC 1087 outlines concepts pertaining to what the IAB considers unethical and unacceptable.
Which background check is the MOST important when hiring someone who will work with children?
Criminal History
Criminal history is the MOST important when hiring someone who will work with children.
Which organizational role owns a system and must work with other users to ensure that data is secure?
System Owner
The system owner owns a system and must work with other users to ensure that data is secure.
Which RAID method does not provide fault tolerance?
RAID 0
RAID 0: Also called disk striping, this method writes the data across multiple drives, but although it improves performance, its does not provide fault tolerance.
Which background check is the MOST important when hiring someone who will drive a motor vehicle?
Driving Record
A driving record background check is the MOST important when hiring someone who will drive a motor vehicle.
Which of the following is a component of business continuity, disaster recovery, and risk management and is considered as plan B?
Contingency Plan
A contingency plan is sometimes referred to as “Plan B” because it can be also used as an alternative for action if expected results fail to materialize. Contingency planning is a component of business continuity, disaster recovery, and risk management.
A loss of electricity is an example of which type of threat?
System Threats
System threats: Threats that exist not from the forces of nature but from failures in systems that provide basic services such as electricity and utilities.
Which of the following protocols will populate the protocol field of the IP header with a value of 6?
TCP
The listed protocols will populate the protocol field of the IP header with the following values TCP- 6 UDP- 17 ICMP- 1 IGMP- 2 L2TP- 115.
Under the General Data Protection Regulation (GDPR), which of the following allowed?
Information collected from users can be shared with exclusive permission.
What characteristic is present if transactions do not interact with other transactions until completion?
Isolation
Isolation: Transactions do not interact with other transactions until completion.
Which of the following is the reallocation of system resources after ensuring that there is no residual data left on the medium?
Object Reuse
Object reuse: The allocation or reallocation of system resources after ensuring that there is no residual data left on the medium.
In the military, which information is usually considered unclassified?
Recruitment Numbers
Recruitment numbers are usually considered unclassified in the military.
In a distributed environment, which of the following is software that ties the client and server software together?
Middleware
In a distributed environment, middleware is software that ties the client and server software together. It is neither a part of the operating system nor a part of the server software. It is the code that lies between the operating system and applications on each side of a distributed computing system in a network.
Which of the following methods includes degaussing?
Purging
Degaussing, a purging technique, exposes the media to a powerful, alternating magnetic field, removing any previously written data and leaving the media in a magnetically randomized (blank) state.
What is the highest level of classification for commercial systems?
Confidential
Commercial systems usually use the following classifications, from highest to lowest:
Confidential
Private
Sensitive
Public
Which of the following methods chemically alters the media?
Pulping
Pulping chemically alters the media.
Destruction is the physical act of destroying media in such a way that it cannot be reconstructed.
Shredding involves physically breaking media to pieces. Pulverizing involves reducing media to dust.Finally, burning incinerates the media.
Which of the following components should be considered as part of any information classification system?
All the Statements
Access Control Measures
Backup/Recovery
Physical Security
Data Encryption