CISSP Sample Flashcards
What enforces the authorized access relationships between subjects and objects? A. The reference monitor B. Discretionary Access Control C. Trusted Kernel D. Mandatory Access Control
A. The reference monitor
Which of the following IP address ranges is reserved for private IP addressing by IANA (Internet Assigned Number Authority) per RFC 1918? A. 172.0.0.0 - 172.255.255.255 B. 172.0.0.0 - 172.15.255.255 C. 172.16.0.0 - 172.31.255.255 D. 172.16.0.0 - 172.16.255.255
C. 172.16.0.0 - 172.31.255.255
In quantitative terms, how would you calculate the benefit of a Disaster Recovery capability? A. (rate of threat occurrence) x (average single incident cost) - (expected insurance claims) B. (rate of threat occurrence) x (average annual incident cost) - (expected insurance claims) C. (Expected loss due to interruption with disaster plan) - (expected loss due to interruption without disaster plan) D. (Expected loss due to interruption without disaster plan) - (expected loss due to interruption with disaster plan)
D. (Expected loss due to interruption without disaster plan) - (expected loss due to interruption with disaster plan)
The software Engineering Institute’s Capability Maturity Model Integration (SEI-CMMI) focuses on A. software development methods B. Systems integration C. Process Management D. Software testing and evaluation
C. Process Management
What type of cyrptoanalysis attack can be carried out when the attacker can access the encryption process and send messages at will? A. Known plaintext attack B. Chosen plaintext attack C. Varying cipher attack D. Smooth number attack
B. Chosen plaintext attack
Who is ultimately responsible for the security of an organization’s data hosted at a cloud computing service? A. The cloud computing provider B. The data storage provider C. The application service provider D. The customer of the cloud computing service
D. The customer of the cloud computing service
The information systems security officer (ISSO) is developing a new policy dealing with the disposal of confidential and proprietary organizational data contained on a CD-ROM. What is the BEST method for disposal? A. FORMAT function B. Shredding C. ERASE function D.Degaussing
B. Shredding
During Business Continuity Planning, what should be implemented in anticipation of restoring operations in the absence of key employees? A. Alternate communication devices B. Regular cross-training C. Disaster Recovery site D. Documents describing key operations
B. Regular cross-training
Which of the following is MOST important to consider when developing retention procedures for electronic records from a federal regulatory compliance perspective? A. length of retention period B. media used for backup C. location of the backup library D. criticality of the information being backed up
D. criticality of the information being backed up
Data center with an efficient design are safer and cost less (based on energy requirements for equipment and cooling). The MOST widespread way to measure energy efficiency is A. Power Usage Effectiveness B. Technology Carbon Efficiency C. Corporate Average Data Center Efficiency D. Data Center Productivity
A. Power Usage Effectiveness