100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Official (ISC)² CISSP (ALL DOMAINS) EXAM QUESTIONS WITH GUARANTEED ACCURATE ANSWERS |VERIFIED $22.49   Add to cart

Exam (elaborations)

Official (ISC)² CISSP (ALL DOMAINS) EXAM QUESTIONS WITH GUARANTEED ACCURATE ANSWERS |VERIFIED

 1 view  0 purchase
  • Course
  • CISSP ISC2
  • Institution
  • CISSP ISC2

1. What is the final step of a quantitative risk analysis? A. Determine asset value. B. Assess the annualized rate of occurrence. C. Derive the annualized loss expectancy. D. Conduct a it analysis. - ACCURATE ANSWERS D. The final step of a quantitative risk analysis is conducting a cost/bene...

[Show more]

Preview 4 out of 474  pages

  • September 8, 2024
  • 474
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISSP ISC2
  • CISSP ISC2
avatar-seller
EXAMLINKS
Official (ISC)² CISSP (ALL DOMAINS)
EXAM QUESTIONS
Official (ISC)² CISSP (ALL DOMAINS) EXAM QUESTIONS WITH GUARANTEED
ACCURATE ANSWERS |VERIFIED




1. What is the final step of a quantitative risk analysis?


A. Determine asset value.
B. Assess the annualized rate of occurrence.
C. Derive the annualized loss expectancy.
D. Conduct a cost.benefit analysis. - ACCURATE ANSWERS✔✔ D.
The final step of a quantitative risk analysis is conducting a cost/benefit
analysis to
determine whether the organisation should implement proposed
countermeasure(s).

,2. An evil twin attack that broadcasts a legitimate SSID for an
unauthorised network is an example of what category of threat?


A. Spoofing
B. Information disclosure
C. Repudiation
D. Tampering - ACCURATE ANSWERS✔✔ A.
Spoofing attacks use falsified identities. Spoofing attacks may use false
IP addresses, email addresses, names, or, in the case of an evil twin
attack, SSIDs.


3. Under the Digital Millennium Copyright Act (DMCA), what type of
offenses do not require prompt action by an Internet service provider
after it receives a notification of
infringement claim from a copyright holder?


A. Storage of information by a customer on a provider's server
B. Caching of information by the provider
C. Transmission of information over the provider's network by a
customer
D. Caching of information in a provider search engine - ACCURATE
ANSWERS✔✔ C.
The DMCA states that providers are not responsible for the transitory
activities of

,their users. Transmission of information over a network would qualify
for this exemption. The other activities listed are all nontransitory
actions that require
remediation by the provider.


4. FlyAway Travel has offices in both the European Union and the
United States and transfers personal information between those offices
regularly. Which of the seven
requirements for processing personal information states that
organizations must inform individuals about how the information they
collect is used?


A. Notice
B. Choice
C. Onward Transfer
D. Enforcement - ACCURATE ANSWERS✔✔ A.
The Notice principle says that organizations must inform individuals of
the information the organization collects about individuals and how the
organization will use it. These principles are based upon the Safe Harbor
Privacy Principles issued by the US Department of Commerce in 2000
to help US companies comply with EU and Swiss privacy laws when
collecting, storing, processing or transmitting data on EU or
Swiss citizens.


5. Which one of the following is not one of the three common threat
modeling techniques?

, A. Focused on assets
B. Focused on attackers
C. Focused on software
D. Focused on social engineering - ACCURATE ANSWERS✔✔ D.
The three common threat modeling techniques are focused on attackers,
software,
and assets. Social engineering is a subset of attackers.


6. Which one of the following elements of information is not considered
personally identifiable information that would trigger most US state data
breach laws?


A. Student identification number
B. Social Security number
C. Driver's license number
D. Credit card number - ACCURATE ANSWERS✔✔ A.
Most state data breach notification laws are modeled after California's
law, which
covers Social Security number, driver's license number, state
identification card number, credit/debit card numbers, bank account
numbers (in conjunction with a PIN or password), medical records, and
health insurance information.


7. In 1991, the federal sentencing guidelines formalized a rule that
requires senior executives to take personal responsibility for information
security matters. What is

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EXAMLINKS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $22.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$22.49
  • (0)
  Add to cart