【计算机类职业资格】计算机CISSP认证-1及答案解析.doc
《【计算机类职业资格】计算机CISSP认证-1及答案解析.doc》由会员分享,可在线阅读,更多相关《【计算机类职业资格】计算机CISSP认证-1及答案解析.doc(31页珍藏版)》请在麦多课文档分享上搜索。
1、计算机 CISSP认证-1 及答案解析(总分:100.00,做题时间:90 分钟)1.Which of the following best describes the relationship between CobiT and ITIL?(分数:2.00)A.CobiT is a model for IT governance, whereas ITIL is a model for corporate governance.B.CobiT provides a corporate governance roadmap, whereas ITIL is a customizable fra
2、mework for IT service management.C.CobiT defines IT goals, whereas ITIL provides the process-level steps on how to achieve them.D.CobiT provides a framework for achieving business goals, whereas ITIL defines a framework for achieving IT service-level goals.2.Jane has been charged with ensuring that
3、clients“ personal health information is adequately protected before it is exchanged with a new European partner. What data security requirements must she adhere to?(分数:2.00)A.HIPAAB.NIST SP 800-66C.Safe HarborD.European Union Principles on Privacy3.Global organizations that transfer data across inte
4、rnational boundaries must abide by guidelines and transborder information flow rules developed by an international organization that helps different governments come together and tackle the economic, social, and governance challenges of a globalized economy. What organization is this?(分数:2.00)A.Comm
5、ittee of Sponsoring Organizations of the Treadway CommissionB.The Organisation for Economic Co-operation and DevelopmentC.CobiTD.International Organization for Standardization4.Steve, a department manager, has been asked to join a committee that is responsible for defining an acceptable level of ris
6、k for the organization, reviewing risk assessment and audit reports, and approving significant changes to security policies and programs. What committee is he joining?(分数:2.00)A.Security policy committeeB.Audit committeeC.Risk management committeeD.Security steering committee5.As head of sales, Jim
7、is the information owner for the sales department. Which of the following is not Jim“s responsibility as information owner?(分数:2.00)A.Assigning information classificationsB.Dictating how data should be protectedC.Verifying the availability of dataD.Determining how long to retain data6.Assigning data
8、 classification levels can help with all of the following except:(分数:2.00)A.The grouping of classified information with hierarchical and restrictive securityB.Ensuring that nonsensitive data is not being protected by unnecessary controlsC.Extracting data from a databaseD.Lowering the costs of protec
9、ting data7.Which of the following is not included in a risk assessment?(分数:2.00)A.Discontinuing activities that introduce riskB.Identifying assetsC.Identifying threatsD.Analyzing risk in order of cost or criticality8.Sue has been tasked with implementing a number of security controls, including anti
10、virus and antispam software, to protect the company“s e-mail system, What type of approach is her company taking to handle the risk posed by the system?(分数:2.00)A.Risk mitigationB.Risk acceptanceC.Risk avoidanceD.Risk transference9.The integrity of data is not related to which of the following?(分数:2
11、.00)A.Unauthorized manipulation or changes to dataB.The modification of data without authorizationC.The intentional or accidental substitution of dataD.The extraction of data to share with unauthorized entities10.There are several methods an intruder can use to gain access to company assets. Which o
12、f the following best describes masquerading?(分数:2.00)A.Changing an IP packet“s source addressB.Elevating privileges to gain accessC.An attempt to gain unauthorized access as another userD.Creating a new authorized user with hacking tools11.A number of factors should be considered when assigning valu
13、es to assets. Which of the following is not used to determine the value of an asset?(分数:2.00)A.The asset“s value in the external marketplaceB.The level of insurance required to cover the assetC.The initial and outgoing costs of purchasing, licensing, and supporting the assetD.The asset“s value to th
14、e organization“s production operations12.Jill is establishing a companywide sales program that will require different user groups with different privileges to access information on a centralized database. How should the security manager secure the database?(分数:2.00)A.Increase the database“s security
15、 controls and provide more granularity.B.Implement access controls that display each user“s permissions each time they access the database.C.Change the database“s classification label to a higher security status.D.Decrease the security so that all users can access the information as needed.13.As his
16、 company“s CISO, George needs to demonstrate to the Board of Directors the necessity of a strong risk management program. Which of the following should George use to calculate the company“s residual risk?(分数:2.00)A.threatsvulnerabilityasset value=residual riskB.SLEfrequency=ALE, which is equal to re
17、sidual riskC.(threatsasset valuevulnerability)control gap=residual riskD.(total risk-asset value)countermeasures=residual risk14.Authorization creep is to access controls what scope creep is to software development. Which of the following is not true of authorization creep?(分数:2.00)A.Users have a te
18、ndency to request additional permissions without asking for others to be taken away.B.It is a violation of “least privilege.“C.It enforces the “need-to-know“ concept.D.It commonly occurs when users transfer to other departments or change positions.15.For what purpose was the COSO framework developed
19、?(分数:2.00)A.To address fraudulent financial activities and reportingB.To help organizations install, implement, and maintain CobiT controlsC.To serve as a guideline for IT security auditors to use when verifying complianceD.To address regulatory requirements related to protecting private health info
20、rmation16.Susan, an attorney, has been hired to fill a new position at Widgets Inc. The position is Chief Privacy Officer (CPO). What is the primary function of her new role?(分数:2.00)A.Ensuring the protection of partner dataB.Ensuring the accuracy and protection of company financial informationC.Ens
21、uring that security policies are defined and enforcedD.Ensuring the protection of customer, company, and employee data17.Jared plays a role in his company“s data classification system. In this role, he must practice due care when accessing data and ensure that the data is used only in accordance wit
22、h allowed policy while abiding by the rules set for the classification of the data. He does not determine, maintain, or evaluate controls, so what is Jared“s role?(分数:2.00)A.Data ownerB.Data custodianC.Data userD.Information systems auditor18.Risk assessment has several different methodologies. Whic
23、h of the following official risk methodologies was not created for the purpose of analyzing security risks?(分数:2.00)A.FAPB.OCTAVEC.ANZ 4360D.NIST SP 800-3019.Which of the following is not a characteristic of a company with a security governance program in place?(分数:2.00)A.Board members are updated q
24、uarterly on the company“s state of security.B.All security activity takes place within the security department.C.Security products, services, and consultants are deployed in an informed manner.D.The organization has established metrics and goals for improving security.20.Michael is charged with deve
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 职业资格 CISSP 认证 答案 解析 DOC
