[计算机类试卷]CISSP认证考试(信息安全治理与风险管理)模拟试卷1及答案与解析.doc
《[计算机类试卷]CISSP认证考试(信息安全治理与风险管理)模拟试卷1及答案与解析.doc》由会员分享,可在线阅读,更多相关《[计算机类试卷]CISSP认证考试(信息安全治理与风险管理)模拟试卷1及答案与解析.doc(34页珍藏版)》请在麦多课文档分享上搜索。
1、CISSP认证考试(信息安全治理与风险管理)模拟试卷 1及答案与解析 1 Which of the following best describes the relationship between CobiT and ITIL? ( A) CobiT is a model for IT governance, whereas ITIL is a model for corporate governance. ( B) CobiT provides a corporate governance roadmap, whereas ITIL is a customizable framework
2、for IT service management. ( C) CobiT defines IT goals, whereas ITIL provides the process-level steps on how to achieve them. ( D) CobiT provides a framework for achieving business goals, whereas ITIL defines a framework for achieving IT service-level goals. 2 Jane has been charged with ensuring tha
3、t clients personal health information is adequately protected before it is exchanged with a new European partner. What data security requirements must she adhere to? ( A) HIPAA ( B) NIST SP 800-66 ( C) Safe Harbor ( D) European Union Principles on Privacy 3 Global organizations that transfer data ac
4、ross international boundaries must abide by guidelines and transborder information flow rules developed by an international organization that helps different governments come together and tackle the economic, social, and governance challenges of a globalized economy. What organization is this? ( A)
5、Committee of Sponsoring Organizations of the Treadway Commission ( B) The Organisation for Economic Co-operation and Development ( C) CobiT ( D) International Organization for Standardization 4 Steve, a department manager, has been asked to join a committee that is responsible for defining an accept
6、able level of risk for the organization, reviewing risk assessment and audit reports, and approving significant changes to security policies and programs. What committee is he joining? ( A) Security policy committee ( B) Audit committee ( C) Risk management committee ( D) Security steering committee
7、 5 As head of sales, Jim is the information owner for the sales department. Which of the following is not Jims responsibility as information owner? ( A) Assigning information classifications ( B) Dictating how data should be protected ( C) Verifying the availability of data ( D) Determining how long
8、 to retain data 6 Assigning data classification levels can help with all of the following except: ( A) The grouping of classified information with hierarchical and restrictive security ( B) Ensuring that nonsensitive data is not being protected by unnecessary controls ( C) Extracting data from a dat
9、abase ( D) Lowering the costs of protecting data 7 Which of the following is not included in a risk assessment? ( A) Discontinuing activities that introduce risk ( B) Identifying assets ( C) Identifying threats ( D) Analyzing risk in order of cost or criticality 8 Sue has been tasked with implementi
10、ng a number of security controls, including antivirus and antispam software, to protect the companys e-mail system. What type of approach is her company taking to handle the risk posed by the system? ( A) Risk mitigation ( B) Risk acceptance ( C) Risk avoidance ( D) Risk transference 9 The integrity
11、 of data is not related to which of the following? ( A) Unauthorized manipulation or changes to data ( B) The modification of data without authorization ( C) The intentional or accidental substitution of data ( D) The extraction of data to share with unauthorized entities 10 There are several method
12、s an intruder can use to gain access to company assets. Which of the following best describes masquerading? ( A) Changing an IP packets source address ( B) Elevating privileges to gain access ( C) An attempt to gain unauthorized access as another user ( D) Creating a new authorized user with hacking
13、 tools 11 A number of factors should be considered when assigning values to assets. Which of the following is not used to determine the value of an asset? ( A) The assets value in the external marketplace ( B) The level of insurance required to cover the asset ( C) The initial and outgoing costs of
14、purchasing, licensing, and supporting the asset ( D) The assets value to the organizations production operations 12 Jill is establishing a companywide sales program that will require different user groups with different privileges to access information on a centralized database. How should the secur
15、ity manager secure the database? ( A) Increase the databases security controls and provide more granularity. ( B) Implement access controls that display each users permissions each time they access the database. ( C) Change the databases classification label to a higher security status. ( D) Decreas
16、e the security so that all users can access the information as needed. 13 As his companys CISO, George needs to demonstrate to the Board of Directors the necessity of a strong risk management program. Which of the following should George use to calculate the companys residual risk? ( A) threats vuln
17、erability asset value = residual risk ( B) SLE frequency = ALE, which is equal to residual risk ( C) (threats asset value vulnerability) x control gap = residual risk ( D) (total risk - asset value) countermeasures = residual risk 14 Authorization creep is to access controls what scope creep is to s
18、oftware development. Which of the following is not true of authorization creep? ( A) Users have a tendency to request additional permissions without asking for others to be taken away. ( B) It is a violation of “least privilege.“ ( C) It enforces the “need-to-know“ concept. ( D) It commonly occurs w
19、hen users transfer to other departments or change positions. 15 For what purpose was the COSO framework developed? ( A) To address fraudulent financial activities and reporting ( B) To help organizations install, implement, and maintain CobiT controls ( C) To serve as a guideline for IT security aud
20、itors to use when verifying compliance ( D) To address regulatory requirements related to protecting private health information 16 Susan, an attorney, has been hired to fill a new position at Widgets Inc. The position is Chief Privacy Officer (CPO). What is the primary function of her new role? ( A)
21、 Ensuring the protection of partner data ( B) Ensuring the accuracy and protection of company financial information ( C) Ensuring that security policies are defined and enforced ( D) Ensuring the protection of customer, company, and employee data 17 Jared plays a role in his companys data classifica
22、tion system. In this role, he must practice due care when accessing data and ensure that the data is used only in accordance with allowed policy while abiding by the rules set for the classification of the data. He does not determine, maintain, or evaluate controls, so what is Jareds role? ( A) Data
23、 owner ( B) Data custodian ( C) Data user ( D) Information systems auditor 18 Risk assessment has several different methodologies. Which of the following official risk methodologies was not created for the purpose of analyzing security risks? ( A) FAP ( B) OCTAVE ( C) ANZ 4360 ( D) NIST SP 800-30 19
24、 Which of the following is not a characteristic of a company with a security governance program in place? ( A) Board members are updated quarterly on the companys state of security. ( B) All security activity takes place within the security department. ( C) Security products, services, and consultan
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 试卷 CISSP 认证 考试 信息 安全 治理 风险 管理 模拟 答案 解析 DOC
