CISSP Exam Test 1 Flashcards
- Which of the following forms the foundation for information systems security?
a. Procedure
b. Policy
c. Software
d. Hardware
b. Policy
- A security policy document usually does not contain which of the following?
a. Rights
b. Responsibilities
c. Authority
d. Requirements
d. Requirements
- A security policy can be violated in all of the following ways except:
a. Knowingly
b. By collusion
c. Unknowingly
d. By committee input
d. By committee input
- An example of a security policy than can be legally monitored is:
a. Keystroke monitoring
b. E-mail monitoring
c. Web browser monitoring
d. Password monitoring
d. Password monitoring
- All of the following are important elements of a good security policy except:
a. Communication
b. Implementation
c. Perception
d. Retraction
c. Perception
- Which of the following is the largest security threat?
a. Internet
b. Users
c. Intranet
d. Extranet
b. Users
- All of the following provide a false sense of security except?
a. Security policy document
b. Password management
c. Policy enforcement
d. Access security rules
c. Policy enforcement
- Which of the following has both advantages and disadvantages?
a. Connecting to the Internet
b. Planting viruses
c. Stealing corporate data
d. Tinkering with configuration settings
a. Connecting to the Internet
- Which of the following is not a common method of attacking a computer system?
a. Password cracking
b. Packet sniffing
c. Encryption key breaking
d. Sendmail
c. Encryption key breaking
- An uncommon information systems security threat is directed at which of the following?
a. Hardware
b. Individuals
c. Software
d. Data
b. Individuals
- A major international threat to networks is:
a. Electrical interference
b. Employees
c. Hackers
d. Telephone line failures
b. Employees
- A common security problem is:
a. Discarded storage media
b. Telephone wiretapping
c. Intelligence consultants
d. Electronic bugs
a. Discarded storage media
- Which of the following is a legal activity?
a. Competitive intelligence
b. Industrial espionage
c. Economic espionage
d. Corporate espionage
a. Competitive intelligence
- Which of the following would not protect an organization from exposure to the Internet?
a. Firewall technology
b. Public networks
c. Passwords
d. Virtual private networks
b. Public networks
- A macro virus is most difficult to:
a. Prevent
b. Detect
c. Correct
d. Attach
b. Detect