Go Back on CISSP Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CISSP Practice Test


Page 3 out of 298 Pages

Topic 2: . Asset Security

When implementing a data classification program, why is it important to avoid too much granularity?


A.

The process will require too many resources


B.

It will be difficult to apply to both hardware and software


C.

It will be difficult to assign ownership to the data


D.

The process will be perceived as having value





C.
  

It will be difficult to assign ownership to the data



Which of the following BEST describes the responsibilities of a data owner?


A.

Ensuring quality and validation through periodic audits for ongoing data integrity


B.

Maintaining fundamental data availability, including data storage and archiving


C.

Ensuring accessibility to appropriate users, maintaining appropriate levels of data security


D.

Determining the impact the information has on the mission of the organization





D.
  

Determining the impact the information has on the mission of the organization



In a data classification scheme, the data is owned by the


A.

system security managers


B.

business managers


C.

Information Technology (IT) managers


D.

end users





B.
  

business managers



Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards?


A.

Personal Identity Verification (PIV)


B.

Cardholder Unique Identifier (CHUID) authentication


C.

Physical Access Control System (PACS) repeated attempt detection


D.

Asymmetric Card Authentication Key (CAK) challenge-response





A.
  

Personal Identity Verification (PIV)



Which of the following is an initial consideration when developing an information security management system?


A.

Identify the contractual security obligations that apply to the organizations


B.

Understand the value of the information assets


C.

Identify the level of residual risk that is tolerable to management


D.

Identify relevant legislative and regulatory compliance requirements





D.
  

Identify relevant legislative and regulatory compliance requirements




Page 3 out of 298 Pages
Previous