0% found this document useful (0 votes)
239 views

Cissp Exam: Certified Information Systems Security Professional Questions & Answers Demo

This document contains a sample of questions and answers from the CISSP exam that cover topics in security and risk management. The questions test knowledge around topics like what should be included in a business impact analysis questionnaire, ways to reduce risk to a laptop before traveling, which poses the greatest risk to data confidentiality, the most important consideration when relocating from a data security perspective, and what type of failure an IT manager should be concerned with for a company using a tier 4 data center for business continuity planning.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
239 views

Cissp Exam: Certified Information Systems Security Professional Questions & Answers Demo

This document contains a sample of questions and answers from the CISSP exam that cover topics in security and risk management. The questions test knowledge around topics like what should be included in a business impact analysis questionnaire, ways to reduce risk to a laptop before traveling, which poses the greatest risk to data confidentiality, the most important consideration when relocating from a data security perspective, and what type of failure an IT manager should be concerned with for a company using a tier 4 data center for business continuity planning.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

ISC2

CISSP Exam
Certified Information Systems Security Professional

Questions & Answers


Demo
Questions & Answers PDF Page 2

Version: 39.0

Topic 1, Security and Risk Management

Question: 1

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT
questions that

A. determine the risk of a business interruption occurring


B. determine the technological dependence of the business processes
C. Identify the operational impacts of a business interruption
D. Identify the financial impacts of a business interruption

Answer: B

Question: 2

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?

A. Examine the device for physical tampering


B. Implement more stringent baseline configurations
C. Purge or re-image the hard disk drive
D. Change access codes

Answer: D

Question: 3

Which of the following represents the GREATEST risk to data confidentiality?

A. Network redundancies are not implemented


B. Security awareness training is not completed
C. Backup tapes are generated unencrypted
D. Users have administrative privileges

Answer: C
Questions & Answers PDF Page 3

Question: 4

What is the MOST important consideration from a data security perspective when an organization plans
to relocate?

A. Ensure the fire prevention and detection systems are sufficient to protect personnel
B. Review the architectural plans to determine how many emergency exits are present
C. Conduct a gap analysis of a new facilities against existing security requirements
D. Revise the Disaster Recovery and Business Continuity (DR/BC) plan

Answer: C

Question: 5

A company whose Information Technology (IT) services are being delivered from a Tier 4 data center, is
preparing a companywide Business Continuity Planning (BCP). Which of the following failures should the
IT manager be concerned with?

A. Application
B. Storage
C. Power
D. Network

Answer: C

You might also like