100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP Official ISC2 practice tests (All domains) Questions And Correct Answers

Rating
-
Sold
-
Pages
315
Grade
A+
Uploaded on
02-12-2024
Written in
2024/2025

©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 1 | P a g e CISSP Official ISC2 practice tests (All domains) Questions And Correct Answers 1. What is the final step of a quantitative risk analysis? A. Determine asset value. B. Assess the annualized rate of occurrence. C. Derive the annualized loss expectancy. D. Conduct a it analysis. - answerD. The final step of a quantitative risk analysis is conducting a cost/benefit analysis to determine whether the organisation should implement proposed countermeasure(s). 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorised network is an example of what category of threat? A. Spoofing B. Information disclosure C. Repudiation D. Tampering - answerA. Spoofing attacks use falsified identities. Spoofing attacks may use false IP addresses, email addresses, names, or, in the case of an evil twin attack, SSIDs. 3. Under the Digital Millennium Copyright Act (DMCA), what type of offenses do not require prompt action by an Internet service provider after it receives a notification of infringement claim from a copyright holder? A. Storage of information by a customer on a provider's server ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 2 | P a g e B. Caching of information by the provider C. Transmission of information over the provider's network by a customer D. Caching of information in a provider search engine - answerC. The DMCA states that providers are not responsible for the transitory activities of their users. Transmission of information over a network would qualify for this exemption. The other activities listed are all nontransitory actions that require remediation by the provider. 4. FlyAway Travel has offices in both the European Union and the United States and transfers personal information between those offices regularly. Which of the seven requirements for processing personal information states that organizations must inform individuals about how the information they collect is used? A. Notice B. Choice C. Onward Transfer D. Enforcement - answerA. The Notice principle says that organizations must inform individuals of the information the organization collects about individuals and how the organization will use it. These principles are based upon the Safe Harbor Privacy Principles issued by the US Department of Commerce in 2000 to help US companies comply with EU and Swiss privacy laws when collecting, storing, processing or transmitting data on EU or Swiss citizens. 5. Which one of the following is not one of the three common threat modeling techniques? A. Focused on assets B. Focused on attackers C. Focused on software D. Focused on social engineering - answerD. The three common threat modeling techniques are focused on attackers, software, ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 3 | P a g e and assets. Social engineering is a subset of attackers. 6. Which one of the following elements of information is not considered personally identifiable information that would trigger most US state data breach laws? A. Student identification number B. Social Security number C. Driver's license number D. Credit card number - answerA. Most state data breach notification laws are modeled after California's law, which covers Social Security number, driver's license number, state identification card number, credit/debit card numbers, bank account numbers (in conjunction with a PIN or password), medical records, and health insurance information. 7. In 1991, the federal sentencing guidelines formalized a rule that requires senior executives to take personal responsibility for information security matters. What is the name of this rule? A. Due diligence rule B. Personal liability rule C. Prudent man rule D. Due process rule - answerC. The prudent man rule requires that senior executives take personal responsibility for ensuring the due care that ordinary, prudent individuals would exercise in the same situation. The rule originally applied to financial matters, but the Federal Sentencing Guidelines applied them to information security matters in 1991. 8. Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve multifactor authentication? A. Username ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 4 | P a g e B. PIN C. Security question D. Fingerprint scan - answerD. A fingerprint scan is an example of a "something you are" factor, which would be appropriate for pairing with a "something you know" password to achieve multifactor authentication. A username is not an authentication factor. PINs and security questions are both "something you know," which would not achieve multifactor authentication when paired with a password because both methods would come from the same category, failing the requirement for multifactor authentication. 9. What United States government agency is responsible for administering the terms of safe harbor agreements between the European Union and the United States under the EU Data Protection Directive? A. Department of Defense B. Department of the Treasury C. State Department D. Department of Commerce - answerD. The US Department of Commerce is responsible for implementing the EU-US Safe Harbor agreement. The validity of this agreement was in legal question in the wake of the NSA surveillance disclosures. 10. Yolanda is the chief privacy officer for a financial institution and is researching privacy issues related to customer checking accounts. Which one of the following laws is most likely to apply to this situation? A. GLBA B. SOX C. HIPAA D. FERPA - answerA.

Show more Read less
Institution
CISSP
Course
CISSP











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP
Course
CISSP

Document information

Uploaded on
December 2, 2024
Number of pages
315
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.



CISSP Official ISC2 practice tests (All
domains) Questions And Correct Answers

1. What is the final step of a quantitative risk analysis?


A. Determine asset value.
B. Assess the annualized rate of occurrence.
C. Derive the annualized loss expectancy.

D. Conduct a cost.benefit analysis. - answer✔D.
The final step of a quantitative risk analysis is conducting a cost/benefit analysis to
determine whether the organisation should implement proposed countermeasure(s).
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorised network is an
example of what category of threat?


A. Spoofing
B. Information disclosure
C. Repudiation

D. Tampering - answer✔A.
Spoofing attacks use falsified identities. Spoofing attacks may use false IP addresses, email
addresses, names, or, in the case of an evil twin attack, SSIDs.
3. Under the Digital Millennium Copyright Act (DMCA), what type of offenses do not require
prompt action by an Internet service provider after it receives a notification of
infringement claim from a copyright holder?


A. Storage of information by a customer on a provider's server

1|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
B. Caching of information by the provider
C. Transmission of information over the provider's network by a customer

D. Caching of information in a provider search engine - answer✔C.
The DMCA states that providers are not responsible for the transitory activities of
their users. Transmission of information over a network would qualify for this exemption. The
other activities listed are all nontransitory actions that require
remediation by the provider.
4. FlyAway Travel has offices in both the European Union and the United States and transfers
personal information between those offices regularly. Which of the seven
requirements for processing personal information states that organizations must inform
individuals about how the information they collect is used?


A. Notice
B. Choice
C. Onward Transfer

D. Enforcement - answer✔A.
The Notice principle says that organizations must inform individuals of the information the
organization collects about individuals and how the organization will use it. These principles are
based upon the Safe Harbor Privacy Principles issued by the US Department of Commerce in
2000 to help US companies comply with EU and Swiss privacy laws when collecting, storing,
processing or transmitting data on EU or
Swiss citizens.
5. Which one of the following is not one of the three common threat modeling techniques?


A. Focused on assets
B. Focused on attackers
C. Focused on software

D. Focused on social engineering - answer✔D.
The three common threat modeling techniques are focused on attackers, software,
2|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
and assets. Social engineering is a subset of attackers.
6. Which one of the following elements of information is not considered personally identifiable
information that would trigger most US state data breach laws?


A. Student identification number
B. Social Security number
C. Driver's license number

D. Credit card number - answer✔A.
Most state data breach notification laws are modeled after California's law, which
covers Social Security number, driver's license number, state identification card number,
credit/debit card numbers, bank account numbers (in conjunction with a PIN or password),
medical records, and health insurance information.
7. In 1991, the federal sentencing guidelines formalized a rule that requires senior executives to
take personal responsibility for information security matters. What is
the name of this rule?


A. Due diligence rule
B. Personal liability rule
C. Prudent man rule

D. Due process rule - answer✔C.
The prudent man rule requires that senior executives take personal responsibility
for ensuring the due care that ordinary, prudent individuals would exercise in the same
situation. The rule originally applied to financial matters, but the Federal Sentencing Guidelines
applied them to information security matters in 1991.
8. Which one of the following provides an authentication mechanism that would be
appropriate for pairing with a password to achieve multifactor authentication?


A. Username


3|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
B. PIN
C. Security question

D. Fingerprint scan - answer✔D.
A fingerprint scan is an example of a "something you are" factor, which would be
appropriate for pairing with a "something you know" password to achieve multifactor
authentication. A username is not an authentication factor. PINs and security questions are
both "something you know," which would not achieve multifactor
authentication when paired with a password because both methods would come from
the same category, failing the requirement for multifactor authentication.
9. What United States government agency is responsible for administering the terms of safe
harbor agreements between the European Union and the United States under the EU Data
Protection Directive?


A. Department of Defense
B. Department of the Treasury
C. State Department

D. Department of Commerce - answer✔D.
The US Department of Commerce is responsible for implementing the EU-US Safe
Harbor agreement. The validity of this agreement was in legal question in the wake of
the NSA surveillance disclosures.
10. Yolanda is the chief privacy officer for a financial institution and is researching privacy issues
related to customer checking accounts. Which one of the following laws is most
likely to apply to this situation?


A. GLBA
B. SOX
C. HIPAA

D. FERPA - answer✔A.

4|Page

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Brainbarter Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
325
Member since
2 year
Number of followers
153
Documents
22254
Last sold
1 week ago
A+ STUDY MATERIALS.

We offer a wide range of high-quality study materials, including study guides practice exams and flashcards. WELCOME.

3.5

54 reviews

5
21
4
8
3
12
2
4
1
9

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions