【计算机类职业资格】CISSP认证考试(信息安全治理与风险管理)-试卷1及答案解析.doc
《【计算机类职业资格】CISSP认证考试(信息安全治理与风险管理)-试卷1及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】CISSP认证考试(信息安全治理与风险管理)-试卷1及答案解析.doc(17页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP 认证考试(信息安全治理与风险管理)-试卷 1 及答案解析(总分:62.00,做题时间:90 分钟)1.Which of the following best describes the relationship between CobiT and ITIL?(分数:2.00)A.CobiT is a model for IT governance, whereas ITIL is a model for corporate governance.B.CobiT provides a corporate governance roadmap, whereas ITIL is a cu
2、stomizable framework for IT service management.C.CobiT defines IT goals, whereas ITIL provides the process-level steps on how to achieve them.D.CobiT provides a framework for achieving business goals, whereas ITIL defines a framework for achieving IT service-level goals.2.Jane has been charged with
3、ensuring that clients personal health information is adequately protected before it is exchanged with a new European partner. What data security requirements must she adhere to?(分数:2.00)A.HIPAAB.NIST SP 800-66C.Safe HarborD.European Union Principles on Privacy3.Global organizations that transfer dat
4、a across international boundaries must abide by guidelines and transborder information flow rules developed by an international organization that helps different governments come together and tackle the economic, social, and governance challenges of a globalized economy. What organization is this?(分
5、数:2.00)A.Committee of Sponsoring Organizations of the Treadway CommissionB.The Organisation for Economic Co-operation and DevelopmentC.CobiTD.International Organization for Standardization4.Steve, a department manager, has been asked to join a committee that is responsible for defining an acceptable
6、 level of risk for the organization, reviewing risk assessment and audit reports, and approving significant changes to security policies and programs. What committee is he joining?(分数:2.00)A.Security policy committeeB.Audit committeeC.Risk management committeeD.Security steering committee5.As head o
7、f sales, Jim is the information owner for the sales department. Which of the following is not Jims responsibility as information owner?(分数:2.00)A.Assigning information classificationsB.Dictating how data should be protectedC.Verifying the availability of dataD.Determining how long to retain data6.As
8、signing data classification levels can help with all of the following except:(分数:2.00)A.The grouping of classified information with hierarchical and restrictive securityB.Ensuring that nonsensitive data is not being protected by unnecessary controlsC.Extracting data from a databaseD.Lowering the cos
9、ts of protecting data7.Which of the following is not included in a risk assessment?(分数:2.00)A.Discontinuing activities that introduce riskB.Identifying assetsC.Identifying threatsD.Analyzing risk in order of cost or criticality8.Sue has been tasked with implementing a number of security controls, in
10、cluding antivirus and antispam software, to protect the companys e-mail system. What type of approach is her company taking to handle the risk posed by the system?(分数:2.00)A.Risk mitigationB.Risk acceptanceC.Risk avoidanceD.Risk transference9.The integrity of data is not related to which of the foll
11、owing?(分数:2.00)A.Unauthorized manipulation or changes to dataB.The modification of data without authorizationC.The intentional or accidental substitution of dataD.The extraction of data to share with unauthorized entities10.There are several methods an intruder can use to gain access to company asse
12、ts. Which of the following best describes masquerading?(分数:2.00)A.Changing an IP packets source addressB.Elevating privileges to gain accessC.An attempt to gain unauthorized access as another userD.Creating a new authorized user with hacking tools11.A number of factors should be considered when assi
13、gning values to assets. Which of the following is not used to determine the value of an asset?(分数:2.00)A.The assets value in the external marketplaceB.The level of insurance required to cover the assetC.The initial and outgoing costs of purchasing, licensing, and supporting the assetD.The assets val
14、ue to the organizations production operations12.Jill is establishing a companywide sales program that will require different user groups with different privileges to access information on a centralized database. How should the security manager secure the database?(分数:2.00)A.Increase the databases se
15、curity controls and provide more granularity.B.Implement access controls that display each users permissions each time they access the database.C.Change the databases classification label to a higher security status.D.Decrease the security so that all users can access the information as needed.13.As
16、 his companys CISO, George needs to demonstrate to the Board of Directors the necessity of a strong risk management program. Which of the following should George use to calculate the companys residual risk?(分数:2.00)A.threats vulnerability asset value = residual riskB.SLE frequency = ALE, which is eq
17、ual to residual riskC.(threats asset value vulnerability) x control gap = residual riskD.(total risk - asset value) countermeasures = residual risk14.Authorization creep is to access controls what scope creep is to software development. Which of the following is not true of authorization creep?(分数:2
18、.00)A.Users have a tendency to request additional permissions without asking for others to be taken away.B.It is a violation of “least privilege.“C.It enforces the “need-to-know“ concept.D.It commonly occurs when users transfer to other departments or change positions.15.For what purpose was the COS
19、O framework developed?(分数:2.00)A.To address fraudulent financial activities and reportingB.To help organizations install, implement, and maintain CobiT controlsC.To serve as a guideline for IT security auditors to use when verifying complianceD.To address regulatory requirements related to protectin
20、g private health information16.Susan, an attorney, has been hired to fill a new position at Widgets Inc. The position is Chief Privacy Officer (CPO). What is the primary function of her new role?(分数:2.00)A.Ensuring the protection of partner dataB.Ensuring the accuracy and protection of company finan
21、cial informationC.Ensuring that security policies are defined and enforcedD.Ensuring the protection of customer, company, and employee data17.Jared plays a role in his companys data classification system. In this role, he must practice due care when accessing data and ensure that the data is used on
22、ly in accordance with allowed policy while abiding by the rules set for the classification of the data. He does not determine, maintain, or evaluate controls, so what is Jareds role?(分数:2.00)A.Data ownerB.Data custodianC.Data userD.Information systems auditor18.Risk assessment has several different
23、methodologies. Which of the following official risk methodologies was not created for the purpose of analyzing security risks?(分数:2.00)A.FAPB.OCTAVEC.ANZ 4360D.NIST SP 800-3019.Which of the following is not a characteristic of a company with a security governance program in place?(分数:2.00)A.Board me
24、mbers are updated quarterly on the companys state of security.B.All security activity takes place within the security department.C.Security products, services, and consultants are deployed in an informed manner.D.The organization has established metrics and goals for improving security.20.Michael is
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 考试 信息 安全 治理 风险 管理 试卷 答案 解析 DOC
