Certificate in Information Security Management Principles (CISMP) Quiz Questions and Answers
The classification level of an asset must be primarily based on which of the following choices?
Answer :
Criticality and sensitivity
Explanation :
The extent to which an asset is critical to business operations or can damage the organization if disclosed is the primary consideration for the level of protection required.
Zero day exploits is a cyber attack that occurs on the same day a weakness is discovered in software. At that point, it's exploited before a fix becomes available from its creator.
Answer :
TRUE
When a person is harassed repeatedly by being followed, called or be written to he/she is a target of.
Answer :
Stalking
Grandfather-father-son backup is a common rotation scheme for backup media, in which there are three or more backup cycles, such as daily, weekly and monthly.
Answer :
TRUE
The legal risks of ethical hacking include lawsuits due to __________ of personal data.
Answer :
disclosure
When a security test and review of a solution should be conducted?
Answer :
From concept phase until retirement of solution
What is the use of keeping Logs?
Answer :
A) To detect unusual patterns of behaviour B) To detect malware and signatures of known attacks C) To gather evidence of wrongdoing and abuse All of the above
Live environment is the ideal place to deploy a new solution for training end users.