Certificate in Information Security Management Principles (CISMP) Quiz Questions and Answers

The classification level of an asset must be primarily based on which of the following choices?

Answer :
  • Criticality and sensitivity

Explanation :

The extent to which an asset is critical to business operations or can damage the organization if disclosed is the primary consideration for the level of protection required.

_________gain privileged access.

Answer :
  • Root kit

Zero day exploits is a cyber attack that occurs on the same day a weakness is discovered in software. At that point, it's exploited before a fix becomes available from its creator.

Answer :
  • TRUE

When a person is harassed repeatedly by being followed, called or be written to he/she is a target of.

Answer :
  • Stalking

Grandfather-father-son backup is a common rotation scheme for backup media, in which there are three or more backup cycles, such as daily, weekly and monthly.

Answer :
  • TRUE

The legal risks of ethical hacking include lawsuits due to __________ of personal data.

Answer :
  • disclosure

When a security test and review of a solution should be conducted?

Answer :
  • From concept phase until retirement of solution

What is the use of keeping Logs?

Answer :
  • A) To detect unusual patterns of behaviour
    B) To detect malware and signatures of known attacks
    C) To gather evidence of wrongdoing and abuse
    All of the above

Live environment is the ideal place to deploy a new solution for training end users.

Answer :
  • FALSE