CISSP For Dummies

1. 

The three elements of the C-I-A triad include

  1. Confidentiality, Integrity, Authentication

  2. Confidentiality, Integrity, Availability

  3. Confidentiality, Integrity, Authorization

  4. Confidentiality, Integrity, Accountability

2. 

Which of the following government data classification levels describes information that, if compromised, could cause serious damage to national security?

  1. Top Secret

  2. Secret

  3. Confidential

  4. Sensitive but Unclassified

3. 

The practice of regularly transferring personnel into different positions or departments within an organization is

  1. Separation of duties

  2. Reassignment

  3. Lateral transfers

  4. Job rotations

4. 

The individual responsible for assigning information classification levels for assigned information assets is

  1. Management

  2. Owner

  3. Custodian

  4. User

5. 

Most security policies are categorized as

  1. Informative

  2. Regulatory

  3. Mandatory

  4. Advisory

6. 

A baseline is a type of

  1. Policy

  2. Guideline

  3. Procedure

  4. Standard

7. 

ALE is calculated by using the following formula:

  1. SLE x ARO x EF = ALE

  2. SLE x ARO = ALE

  3. SLE + ARO = ALE

  4. SLE – ARO = ALE

8. 

Which of the following is not considered a general remedy for risk management?

  1. Risk reduction

  2. Risk acceptance

  3. Risk assignment

  4. Risk avoidance

9. 

Failure to implement a safeguard may result in legal liability if

  1. The cost to implement the safeguard is less than the cost of the associated loss.

  2. The cost to implement the safeguard is more than the cost of the associated loss.

  3. An alternate but equally effective and less expensive safeguard is implemented.

  4. An alternate but equally effective and more expensive safeguard is implemented.

10. 

A cost-benefit analysis is useful in safeguard selection for determining

  1. Safeguard effectiveness

  2. Technical feasibility

  3. Cost-effectiveness

  4. Operational impact

Answers

1. 

B. Confidentiality, Integrity, Availability. Confidentiality, integrity, and availability are the three elements of the C-I-A triad. Authentication, authorization, and accountability are access control concepts. Review “Information Security Management Concepts and Principles.”

2. 

B. Secret.Top Secret information leaks could cause grave damage. Confidential information breaches could cause damage. Sensitive but Unclassified information doesn’t have a direct impact on national security. Review “Government data classification.”

3. 

D. Job rotations. Separation of duties is related to job rotations but is distinctly different. Reassignment and lateral transfers are functionally equivalent to job rotations but aren’t necessarily done for the same reasons and aren’t considered security employment practices. Review “Job rotations.”

4. 

B. Owner. Although an information owner may be in a management position and is also considered a user, the information owner role has the responsibility for assigning information classification levels. An information custodian is responsible for day-to-day security tasks. Review “Security roles and responsibilities.”

5. 

D. Advisory. Although not mandatory, advisory policies are highly recommended and may provide penalties for failure to comply. Review “Policies.”

6. 

D. Standard. A baseline takes into account system-specific parameters to help an organization identify appropriate standards. Review “Standards (and baselines).”

7. 

B. SLE x ARO = ALE. SLE x ARO = ALE is the correct formula for calculating ALE, where SLE is the Single Loss Expectancy, ARO is the Annualized Rate of Occurrence, and ALE is the Annualized Loss Expectancy expressed in dollars. Review “Risk analysis.”

8. 

D. Risk avoidance. Although risk avoidance is a valid concept, it’s impossible to achieve and therefore not considered a general remedy for risk management. Review “Risk control.”

9. 

A. The cost to implement the safeguard is less than the cost of the associated loss.This basic legal liability test determines whether the cost of the safeguard is less than the cost of the associated loss if a threat is realized. Review “Legal liability.”

10. 

C. Cost-effectiveness. A cost-benefit analysis won’t help an organization determine the effectiveness of a safeguard, its technical feasibility, or its operational impact. Review “Cost-effectiveness.”

Категории