Quiz Summary
0 of 25 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 25 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Current
- Review / Skip
- Answered
- Correct
- Incorrect
-
Question 1 of 25
1. Question
Bobbi is investigating a security incident and discovers that an attacker began with a normal user account but managed to exploit a system vulnerability to provide that account with administrative rights. What type of attack took place under the STRIDE threat model?
CorrectIncorrect -
Question 2 of 25
2. Question
Laura has been asked to perform an SCA. What type of organization is she most likely in?
CorrectIncorrect -
Question 3 of 25
3. Question
Mike recently implemented an intrusion prevention system designed to block common network attacks from affecting his organization. What type of risk management strategy is Mike pursuing?
CorrectIncorrect -
Question 4 of 25
4. Question
When developing a business impact analysis, the team should first create a list of assets. What should happen next?
CorrectIncorrect -
Question 5 of 25
5. Question
Which one of the following actions might be taken as part of a business continuity plan?
CorrectIncorrect -
Question 6 of 25
6. Question
Keenan Systems recently developed a new manufacturing process for microprocessors. The company wants to license the technology to other companies for use but wants to prevent unauthorized use of the technology. What type of intellectual property protection is best suited for this situation?
CorrectIncorrect -
Question 7 of 25
7. Question
Kelly believes that an employee engaged in the unauthorized use of computing resources for a side business. After consulting with management, she decides to launch an administrative investigation. What is the burden of proof that she must meet in this investigation?
CorrectIncorrect -
Question 8 of 25
8. Question
Brenda’s organization recently completed the acquisition of a competitor firm. Which one of the following tasks would be LEAST likely to be part of the organizational processes addressed during the acquisition?
CorrectIncorrect -
Question 9 of 25
9. Question
Which one of the following principles imposes a standard of care upon an individual that is broad and equivalent to what one would expect from a reasonable person under the circumstances?
CorrectIncorrect -
Question 10 of 25
10. Question
Vincent believes that a former employee took trade secret information from his firm and brought it with him to a competitor. He wants to pursue legal action. Under what law could he pursue charges?
CorrectIncorrect -
Question 11 of 25
11. Question
Tony is developing a business continuity plan and is having difficulty prioritizing resources because of the difficulty of combining information about tangible and intangible assets. What would be the most effective risk assessment approach for him to use?
CorrectIncorrect -
Question 12 of 25
12. Question
You are completing a review of the controls used to protect a media storage facility in your organization and would like to properly categorize each control that is currently in place. Which of the following control categories accurately describe a fence around a facility? (Select all that apply.)
CorrectIncorrect -
Question 13 of 25
13. Question
You are completing your business continuity planning effort and have decided that you want to accept one of the risks. What should you do next?
CorrectIncorrect -
Question 14 of 25
14. Question
Alyssa is responsible for her organization’s security awareness program. She is concerned that changes in technology may make the content outdated. What control can she put in place to protect against this risk?
CorrectIncorrect -
Question 15 of 25
15. Question
Chris is advising travelers from his organization who will be visiting many different countries overseas. He is concerned about compliance with export control laws. Which of the following technologies is most likely to trigger these regulations?
CorrectIncorrect -
Question 16 of 25
16. Question
Tim’s organization recently received a contract to conduct sponsored research as a government contractor. What law now likely applies to the information systems involved in this contract?
CorrectIncorrect -
Question 17 of 25
17. Question
Yolanda is the chief privacy officer for a financial institution and is researching privacy requirements related to customer checking accounts. Which one of the following laws is most likely to apply to this situation?
CorrectIncorrect -
Question 18 of 25
18. Question
Wanda is working with one of her organization’s European Union business partners to facilitate the exchange of customer information. Wanda’s organization is located in the United States. What would be the best method for Wanda to use to ensure GDPR compliance?
CorrectIncorrect -
Question 19 of 25
19. Question
Henry recently assisted one of his co-workers in preparing for the CISSP exam. During this process, Henry disclosed confidential information about the content of the exam, in violation of Canon IV of the Code of Ethics: “Advance and protect the profession.” Who may bring ethics charges against Henry for this violation?
CorrectIncorrect -
Question 20 of 25
20. Question
Renee is speaking to her board of directors about their responsibilities to review cybersecurity controls. What rule requires that senior executives take personal responsibility for information security matters?
CorrectIncorrect -
Question 21 of 25
21. Question
Which one of the following elements of information is not considered personally identifiable information that would trigger most United States (U.S.) state data breach laws?
CorrectIncorrect -
Question 22 of 25
22. Question
After conducting a qualitative risk assessment of her organization, Sally recommends purchasing cybersecurity breach insurance. What type of risk response behavior is she recommending?
CorrectIncorrect -
Question 23 of 25
23. Question
FlyAway Travel has offices in both the European Union (EU) and the United States and transfers personal information between those offices regularly. They have recently received a request from an EU customer requesting that their account be terminated. Under the General Data Protection Regulation (GDPR), which requirement for processing personal information states that individuals may request that their data no longer be disseminated or processed?
CorrectIncorrect -
Question 24 of 25
24. Question
Francine is a security specialist for an online service provider in the United States. She recently received a claim from a copyright holder that a user is storing information on her service that violates the third party’s copyright. What law governs the actions that Francine must take?
CorrectIncorrect -
Question 25 of 25
25. Question
Gavin is creating a report to management on the results of his most recent risk assessment. In his report, he would like to identify the remaining level of risk to the organization after adopting security controls. What term best describes this current level of risk?
CorrectIncorrect