Preview

Cissp Study Guide

Powerful Essays
Open Document
Open Document
67651 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cissp Study Guide
ISC CISSP

ISC CISSP Certified Information Systems Security Professional

Practice Test
Version

ISC CISSP: Practice Exam QUESTION NO: 1 All of the following are basic components of a security policy EXCEPT the A. definition of the issue and statement of relevant terms. B. statement of roles and responsibilities C. statement of applicability and compliance requirements. D. statement of performance of characteristics and requirements. Answer: D Explanation: Policies are considered the first and highest level of documentation, from which the lower level elements of standards, procedures, and guidelines flow. This order , however, does not mean that policies are more important than the lower elements. These higher-level policies, which are the more general policies and statements, should be created first in the process for strategic reasons, and then the more tactical elements can follow . -Ronald Krutz The CISSP PREP Guide (gold edition) pg 13

A security policy would include all of the following EXCEPT A. Background B. Scope statement C. Audit requirements D. Enforcement Answer: B

QUESTION NO: 3

Which one of the following is an important characteristic of an information security policy? A. Identifies major functional areas of information. B. Quantifies the effect of the loss of the information. C. Requires the identification of information owners. D. Lists applications that support the business function. Answer: A Explanation: Information security policies area high-level plans that describe the goals of the procedures. Policies are not guidelines or standards, nor are they procedures or controls. Policies describe "Pass Any Exam. Any Time." -
Ac

tua

lTe

sts

QUESTION NO: 2

.co

m

2

ISC CISSP: Practice Exam security in general terms, not specifics. They provide the blueprints for an overall security program just as a specification defines your next product - Roberta Bragg CISSP Certification Training Guide (que) pg 206

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    1. Identify the touch points between the objectives and requirements of PCI DSS and YieldMore’s IT environment.…

    • 619 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 13 Quiz

    • 1169 Words
    • 5 Pages

    16. Congress's role in national security policy has typically included all of the following EXCEPT…

    • 1169 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Privileged Access Agreement (PAA) - Page 220 – Contractors and temporary workers sign this type of document.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies.…

    • 1066 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    b. CISSP certification is for someone who many years of experience in the InfoSec industry. Typically someone who is CISSP certified will manage a team of SSCP’s. CISSP’s are responsible for the InfoSec throughout the entire organization. They see to it that all…

    • 814 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Test 1 Study Guide CISS 250

    • 3236 Words
    • 32 Pages

    A supply chain management is an enterprise application because the systems that support each business process:…

    • 3236 Words
    • 32 Pages
    Satisfactory Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    Defining policies for every domain of an IT infrastructure breaks down in depth how each entity should be properly used. The policies should also identify the key players that will play a key role in ensuring optimum use of all devices, as well as establishing and maintaining security throughout the process of information traveling through the Infrastructure. Here are some best practices to keep in mind when defining policies for a few of the domains within the infrastructure:…

    • 545 Words
    • 2 Pages
    Satisfactory Essays