Preview Mode Links will not work in preview mode

Reduce Cyber Risk Podcast: "CISSP Training Made Simple"


Jan 18, 2020

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will talk about questions for Domain 1 (Security and Risk Management) of the CISSP Exam.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

Question:  066

Which of the following would generally not be considered an asset in a risk analysis?

  1. A) A development process
  2. B) An IT infrastructure
  3. C) A proprietary system resource
  4. D) Users' personal files

Answer: [D] Users' personal files - The personal files of users are not usually considered assets of the organization and thus are not considered in a risk analysis.

From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

------------------------------------

Question:  067

You've performed a basic quantitative risk analysis on a specific threat/vulnerability/risk relation. You select a possible countermeasure. When performing the calculations again, which of the following factors will change?

  1. A) Exposure factor
  2. B) Single loss expectancy
  3. C) Asset value
  4. D) Annualized rate of occurrence

Answer: [d] Annualized rate of occurrence - A countermeasure directly affects the annualized rate of occurrence, primarily because the countermeasure is designed to prevent the occurrence of the risk, thus reducing its frequency per year.

From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

------------------------------------

Question:  068

What ensures that the subject of an activity or event cannot deny that the event occurred?

  1. A) CIA Triad
  2. B) Abstraction
  3. C) Nonrepudiation
  4. D) Hash totals

Answer: [c] Nonrepudiation - Nonrepudiation ensures that the subject of an activity or event cannot deny that the event occurred.

From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

 ------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS: