CISSP Multiple Choice Question Welcome to your CISSP Multiple Choice Question Assess your knowledge of ISC2- CISSP with multiple choice questions/answers. Each Page includes 15 practice questions that have been prearranged to measure your knowledge of key ideas. These CISSP sample questions cover concepts of eight domains included in the CISSP exam: Security and Risk Management Asset Security Security Engineering Communications and Network Security Identity and Access Management Security and Assessment Testing Security Operations Software Development Security Click Next Button to continue the test: Que 1: A security policy would include all of the following EXCEPTA. BackgroundB. Scope statementC. Audit requirementsD. Enforcement Que 2: All of the following are basic components of a security policy EXCEPT theA. definition of the issue and statement of relevant terms.B. statement of roles and responsibilitiesC. statement of applicability and compliance requirements.D. statement of performance of characteristics and requirements. Que 3: Which one of the following is an important characteristic of an information security policy?A. Identifies major functional areas of information.B. Quantifies the effect of the loss of the information.C. Requires the identification of information owners.D. Lists applications that support the business function Que 4: Ensuring the integrity of business information is the PRIMARY concern ofA. Encryption SecurityB. Procedural Security.C. Logical SecurityD. On-line Security Que 5: Which of the following would be the first step in establishing an information security program?A. Adoption of a corporate information security policy statementB. Development and implementation of an information security standards manualC. Development of a security awareness-training programD. Purchase of security access control software Que 6: Which of the following department managers would be best suited to oversee the development of an information security policy?A. Information SystemsB. Human ResourcesC. Business operationsD. Security administration Que 7: What is the function of a corporate information security policy?A. Issue corporate standard to be used when addressing specific security problems.B. Issue guidelines in selecting equipment, configuration, design, and secure operations.C. Define the specific assets to be protected and identify the specific tasks which must be completed to secure them.D. Define the main security objectives which must be achieved and the security framework to meet business objectives. Que 8: Why must senior management endorse a security policy?A. So that they will accept ownership for security within the organization.B. So that employees will follow the policy directives.C. So that external bodies will recognize the organizations commitment to security.D. So that they can be held legally accountable. Que 9: In which one of the following documents is the assignment of individual roles and responsibilities MOST appropriately defined?A. Security policyB. Enforcement guidelinesC. Acceptable use policyD. Program manual Que 10: Which of the following defines the intent of a system security policy?A. A definition of the particular settings that have been determined to provide optimum security.B. A brief, high-level statement defining what is and is not permitted during the operation of the system.C. A definition of those items that must be excluded on the system.D. A listing of tools and applications that will be used to protect the system. Que 11: When developing an information security policy, what is the FIRST step that should be taken?A. Obtain copies of mandatory regulations.B. Gain management approval.C. Seek acceptance from other departments.D. Ensure policy is compliant with current working practices. Que 12: Which one of the following should NOT be contained within a computer policy?A. Definition of management expectations.B. Responsibilities of individuals and groups for protected information.C. Statement of senior executive support.D. Definition of legal and regulatory controls. Que 13: Which one of the following is NOT a fundamental component of a Regulatory Security Policy?A. What is to be done.B. When it is to be done.C. Who is to do it.D. Why is it to be done Que 14: Which one of the following statements describes management controls that are instituted to implement a security policy?A. They prevent users from accessing any control function.B. They eliminate the need for most auditing functions.C. They may be administrative, procedural, or technical.D. They are generally inexpensive to implement. Que 15: Which must bear the primary responsibility for determining the level of protection needed for information systems resources?A. IS security specialistsB. Senior ManagementC. Seniors security analystsD. system auditors 1 out of 2 Ques 16: Which of the following choices is NOT part of a security policy?A. Definition of overall steps of information security and the importance of securityB. Statement of management intend, supporting the goals and principles of information securityC. Definition of general and specific responsibilities for information security managementD. Description of specific technologies used in the field of information security Ques 17: In an organization, an Information Technology security function should:A. Be a function within the information systems functions of an organizationB. Report directly to a specialized business unit such as legal, corporate security or insuranceC. Be lead by a Chief Security Officer and report directly to the CEOD. Be independent but report to the Information Systems function Ques 18: Which of the following embodies all the detailed actions that personnel are required to follow?A. StandardsB. GuidelinesC. ProceduresD. Baselines Ques 19: A significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible. The action does NOT include"A. Violations of security policy.B. Attempted violations of security policy.C. Non-violations of security policy.D. Attempted violations of allowed actions. Ques 20: Network Security is aA. ProductB. protocolsC. Ever evolving processD. Quick-fix solution Ques 21: Security is a process that is:A. ContinuousB. IndicativeC. ExaminedD. Abnormal Ques 22: What are the three fundamental principles of security?A. Accountability, confidentiality, and integrityB. Confidentiality, integrity, and availabilityC. Integrity, availability, and accountabilityD. Availability, accountability, and confidentiality Ques 23: Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality of transactions over networks may be maintained?A. Communications security management and techniquesB. Networks security management and techniquesC. Clients security management and techniquesD. Servers security management and techniques Ques 24: Making sure that the data is accessible when and where it is needed is which of the following?A. ConfidentialityB. IntegrityC. AcceptabilityD. Availability Ques 25: Which of the following describes elements that create reliability and stability in networks and systems and which assures that connectivity is accessible when needed?A. AvailabilityB. AcceptabilityC. ConfidentialityD. Integrity Ques 26: Most computer attacks result in violation of which of the following security properties?A. AvailabilityB. ConfidentialityC. Integrity and controlD. All of the choices Ques 27: Which of the following are objectives of an information systems security program?A. Threats, vulnerabilities, and risksB. Security, information value, and threatsC. Integrity, confidentiality, and availability.D. Authenticity, vulnerabilities, and costs. Ques 28: An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of Availability can be defined asA. Netware availabilityB. Network availabilityC. Network acceptabilityD. Network accountability Ques 29: The Structures, transmission methods, transport formats, and security measures that are used to provide integrity, availability, and authentication, and confidentiality for transmissions over private and public communications networks and media includes:A. The Telecommunications and Network Security domainB. The Telecommunications and Netware Security domainC. The Technical communications and Network Security domainD. The Telnet and Security domain Ques 30: Which one of the following is the MOST crucial link in the computer security chain?A. Access controlsB. PeopleC. ManagementD. Awareness programs 2 out of 2 Time is Up!