CISSP CR

Generate an image of a cybersecurity professional reviewing a network security system, with elements representing data protection, risk management, and technology in a modern office setting.

CISSP Certification Readiness Quiz

Test your knowledge and readiness for the CISSP certification with this comprehensive quiz. Covering critical topics from risk management to intellectual property, this quiz is designed to help you identify your strengths and weaknesses in cybersecurity.

  • 11 multiple choice questions
  • Instant scoring and feedback
  • Ideal for certification preparation
11 Questions3 MinutesCreated by AnalyzingCoyote123
Which one of the following is an example of physical infrastructure hardening?
Hardware-based network firewall
Two-factor authentication
Fire suppression system
Antivirus software
Which one of the following is normally used as an authorization tool?
ACL
Token
Username
Password
Which one of the following issues is not normally addressed in a service-level agreement (SLA)?
Confidentiality of customer information
Failover time
Uptime
Maximum consecutive downtime
Renee is designing the long-term security plan for her organization and has a three- to five-year planning horizon. What type of plan is she developing?
Operational
Tactical
Summary
Strategic
Which one of the following organizations would not be automatically subject to the terms of HIPAA if they engage in electronic transactions?
Healthcare provider
Health and fitness application developer
Health information clearinghouse
Health insurance plan
Tom is installing a next-generation firewall (NGFW) in his data center that is designed to block many types of application attacks. When viewed from a risk management perspective, what metric is Tom attempting to lower?
Impact
RPO
MTO
Likelihood
Alan works for an e-commerce company that recently had some content stolen by another website and republished without permission. What type of intellectual property protection would best preserve Alan’s company’s rights?
Trade secret
Trademark
Copyright
Patent
What is the formula used to determine risk
Risk = Threat * Vulnerability
Risk = Threat / Vulnerability
Risk = Asset * Threat
Risk = Asset / Threat
Ben is designing a messaging system for a bank and would like to include a feature that allows the recipient of a message to prove to a third party that the message did indeed come from the purported originator. What goal is Ben trying to achieve?
Authentication
Authorization
Integrity
Nonrepudiation
Ryan is a security risk analyst for an insurance company. He is currently examining a scenario in which a hacker might use a SQL injection attack to deface a web server due to a missing patch in the company’s web application. In this scenario, what is the threat
Unpatched web application
Web defacement
Hacker
Operating system
Which one of the following is an administrative control that can protect the confidentiality of information?
Encryption
Non-disclosure agreement
Firewall
Fault tolerance
{"name":"CISSP CR", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge and readiness for the CISSP certification with this comprehensive quiz. Covering critical topics from risk management to intellectual property, this quiz is designed to help you identify your strengths and weaknesses in cybersecurity.11 multiple choice questionsInstant scoring and feedbackIdeal for certification preparation","img":"https:/images/course1.png"}
Powered by: Quiz Maker