CISSP CBK Review Seminar -- Domains 1 & 2 Flashcards
Domains 1 & 2
- International Organization for Standardization (ISO) standard 27002 provides guidance for vendor compliance by outlining
(A) guidelines and practices of security controls.
(B) financial soundness and business viability metrics.
(C) standard best practice for procurement policy.
(D) contract agreement writing standards.
(A) guidelines and practices of security controls.
- Which of the following is an industry specific standard that PRIMARILY deals with privacy matters?
(A) Control Objectives for Information and Related Technology (COBIT)
(B) European Union Principles
(C) International Organization for Standardization (ISO) 9001:2000
(D) The Wassenaar Agreement
(B) European Union Principles
- Which of the following defines the intent of a system security policy?
(A) A description of the settings that will provide the highest level of security
(B) A brief high-level statement defining what is and is not permitted in the operation of the system
(C) A definition of those items that must be denied on the system
(D) A listing of tools and applications that will be used to protect the system
(B) A brief high-level statement defining what is and is not permitted in the operation of the system
- Which of the following is the BEST reason for using an automated risk analysis methodology?
(A) Automated methodologies generally require minimal training and knowledge of risk analysis.
(B) Most software tools have user interfaces that are easy to use and require little or no computer experience.
(C) Minimal information gathering is required due to the amount of information built into the software tool.
(D) Much of the data gathered during the review can be reused, greatly reducing the time required to perform a subsequent analysis.
(D) Much of the data gathered during the review can be reused, greatly reducing the time required to perform a subsequent analysis.
- An organizational information security strategy is incomplete without
(A) recommendations for salary improvement of security professionals.
(B) addressing privacy and health care requirements of employees.
(C) alignment with organizational audit and marketing plans.
(D) incorporating input from organizational privacy and safety professionals.
(D) incorporating input from organizational privacy and safety professionals.
- The organizational information security plan can
(A) assure protection of organizational data and information.
(B) select the technology solutions to enhance organizational security
effectiveness.
(C) identify potential risks to organizational employee behavior.
(D) align organizational data protection schemes to business goals.
(D) align organizational data protection schemes to business goals.
- Verifying vendor compliance with their active security policies is typically provided through
(A) indemnification clauses.
(B) unqualified vendor management reports.
(C) good faith agreements.
(D) audit and standards compliance reporting.
(D) audit and standards compliance reporting.
- What is the MOST critical factor to the success of enterprise security?
(A) Ability to effectively monitor the enterprise
(B) Budget available for security department
(C) Senior management support
(D) Complete security awareness plans
(C) Senior management support
- Which one of the following individuals has PRIMARY responsibility for determining the classification level of information?
(A) Security manager
(B) User
(C) Owner
(D) Auditor
(C) Owner
- When a communication link is subject to monitoring, what advantage does end- to-end encryption have over link encryption?
(A) Cleartext is only available to the sending and receiving processes.
(B) Routing information is included in the message transmission protocol.
(C) Routing information is encrypted by the originator.
(D) Each message has a unique encryption key.
(A) Cleartext is only available to the sending and receiving processes.
- Computer security is the responsibility of
(A) everyone in the organization.
(B) corporate management.
(C) the corporate security staff.
(D) everyone with computer access.
(A) everyone in the organization.
- What is the PRIMARY objective for implementing a security awareness program?
(A) To reduce the cost associated with security tools
(B) To ensure users are aware of security policies and their responsibilities
(C) To reduce the risk of social engineering
(D) To obtain the support of users when investigating security breaches
(B) To ensure users are aware of security policies and their responsibilities
- Employee involuntary termination processing should include
(A) a list of all passwords used by the individual.
(B) a report on outstanding projects.
(C) the surrender of any company identification.
(D) the signing of a Non-Disclosure Agreement (NDA).
(C) the surrender of any company identification.
- What is the company benefit, in terms of risk, for people taking a vacation of a specified minimum length?
(A) Reduces stress levels, thereby lowering insurance claims
(B) Improves morale, thereby decreasing errors
(C) Increases potential for discovering frauds
(D) Reduces dependence on critical individuals
(C) Increases potential for discovering frauds
- The International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) standard 27002 documents which body of knowledge?
(A) Information security management
(B) Personally identifiable health information data management
(C) Credit card handling processes
(D) Software development best practices
(A) Information security management