Preview Mode Links will not work in preview mode

Reduce Cyber Risk Podcast: "CISSP Training Made Simple"


Jan 15, 2020

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will talk about questions for Domain 1 (Security and Risk Management) of the CISSP Exam.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

Question:  063

When seeking to hire new employees, what is the first step?

  1. A) Create a job description.
  2. B) Set position classification.
  3. C) Screen candidates.
  4. D) Request resumes.

Answer: A. Create a job description.

The first step in hiring new employees is to create a job description. Without a job description, there is no consensus on what type of individual needs to be found and hired.

Source: From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

------------------------------------

Question:  064

Which of the following describes the freedom from being observed, monitored, or examined without consent or knowledge?

  1. A) Integrity
  2. B) Privacy
  3. C) Authentication
  4. D) Accountability

Answer: [b] Privacy - One definition of privacy is freedom from being observed, monitored, or examined without consent or knowledge.

Source:  From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

------------------------------------

Question:  065

Which of the following is typically not a characteristic considered when classifying data?

  1. A) Value
  2. B) Size of object
  3. C) Useful lifetime
  4. D) National security implications

Answer: [b] Size of object - Size is not a criterion for establishing data classification. When classifying an object, you should take value, lifetime, and security implications into consideration.

From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS: