CISSP - Question Bank 18
Test your knowledge of CISSP with these multiple choice questions. Each Question Bank includes 20 practice questions that have been designed to measure your knowledge of key ideas.
A key factor to keep in mind is that guessing is better than not answering a question.
Every single question on the CISSP exam is a four-option multiple choice question with a single correct answer. Some are straightforward, such as asking you to select a definition. Some are a bit more involved, such as asking you to select the appropriate concept or best practice. And some questions present you with a scenario or situation and ask you to select the best response.
StartQ1. What is a computer crime?
A. Any attack specifically listed in your security policy
B. Any illegal attack that compromises a protected computer
C. Any violation of a law or regulation that involves a computer
D. Failure to practice due diligence in computer security
Q2. What is the main purpose of a military and intelligence attack?
A. To attack the availability of military systems
B. To obtain secret and restricted information from military or law enforcement sources
C. To utilize military or intelligence agency systems to attack other nonmilitary sites
Q3. What type of attack targets trade secret information stored on a civilian organization's system?
A. Business attack
B. Denial of service attack
C. Financial attack
D. Military and intelligence attack
Q4. What goal is not a purpose of a financial attack?
A. Access services you have not purchased
B. Disclose confidential personal employee information
C. Transfer funds from an unapproved source into your account
Q5. What is one possible goal of a terrorist attack?
A. Alter sensitive trade secret documents
B. Damage the ability to communicate and respond to a physical attack
C. Steal unclassified information
D. Transfer funds to other countries
Q6. Which of the following would not be a primary goal of a grudge attack?
A. Disclose embarrassing personal information
B. Launch a virus on an organization's system
C. Send inappropriate e-mail with a spoofed origination address of the victim organization
D. Use automated tools to scan the organization's systems for vulnerable ports
Q7. What are the primary reasons attackers engage in "fun" attacks? (Choose all that apply.)
A. Bragging rights
B. Money from the sale of stolen documents
C. Pride of conquering a secure system
D. Retaliation against a person or organization
Q8. What is the most important rule to follow when collecting evidence?
A. Do not turn off a computer until you photograph the screen.
B. List all people present while collecting evidence.
C. Never modify evidence during the collection process.
D. Transfer all equipment to a secure storage location.
Q9. What would be a valid argument for not immediately removing power from a machine when an incident is discovered?
A. All of the damage has been done. Turning the machine off would not stop additional damage.
B. There is no other system that can replace this one if it is turned off.
C. Too many users are logged in and using the system.
D. Valuable evidence in memory will be lost.
Q10. What is the reason many incidents are never reported?
A. It involves too much paperwork.
B. Reporting too many incidents could hurt an organization's reputation.
C. The incident is never discovered.
D. Too much time has passed and the evidence is gone.
Q11. What is an incident?
A. Any active attack that causes damage to your system
B. Any violation of a code of ethics
C. Any crime (or violation of a law or regulation) that involves a computer
D. Any violation of your security policy
Q12. If port scanning does no damage to a system, why is it generally considered an incident?
A. All port scans indicate adversarial behavior.
B. Port scans can precede attacks that cause damage and can indicate a future attack.
C. Scanning a port damages the port.
Q13. What type of incident is characterized by obtaining an increased level of privilege?
A. Compromise
B. Denial of service
C. Malicious code
D. Scanning
Q14. What is the best way to recognize abnormal and suspicious behavior on your system?
A. Be aware of the newest attacks.
B. Configure your IDS to detect and report all abnormal traffic.
C. Know what your normal system activity looks like.
D. Study the activity signatures of the main types of attacks.
Q15. If you need to confiscate a PC from a suspected attacker who does not work for your organization, what legal avenue should you pursue?
A. Consent agreement signed by employees
B. Search warrant
C. Subpoena
D. Voluntary consent
Q16. Why should you avoid deleting log files on a daily basis?
A. An incident may not be discovered for several days and valuable evidence could be lost.
B. Disk space is cheap and log files are used frequently.
C. Log files are protected and cannot be altered.
D. Any information in a log file is useless after it is several hours old.
Q17. Which of the following conditions indicate that you must report an incident? (Choose all that apply.)
A. Confidential information protected by government regulation was possibly disclosed.
B. Damages exceeded $1,500.
C. The incident has occurred before.
D. The incident resulted in a violation of a law.
Q18. What are ethics?
A. Mandatory actions required to fulfill job requirements
B. Professional standards of regulations
C. Regulations set forth by a professional organization
D. Rules of personal behavior
Q19. According to the (ISC)2 Code of Ethics, how are CISSPs expected to act?
A. Honestly, diligently, responsibly, and legally
B. Honorably, honestly, justly, responsibly, and legally
C. Upholding the security policy and protecting the organization
D. Trustworthy, loyally, friendly, courteously
Q20. Which of the following actions are considered unacceptable and unethical according to RFC 1087, “Ethics and the Internet?”
A. Actions that compromise the privacy of classified information
B. Actions that compromise the privacy of users
C. Actions that disrupt organizational activities
D. Actions in which a computer is used in a manner inconsistent with a stated security policy
- Question Bank 00
- Question Bank 01
- Question Bank 02
- Question Bank 03
- Question Bank 04
- Question Bank 05
- Question Bank 06
- Question Bank 07
- Question Bank 08
- Question Bank 09
- Question Bank 10
- Question Bank 11
- Question Bank 12
- Question Bank 13
- Question Bank 14
- Question Bank 15
- Question Bank 16
- Question Bank 17
- Question Bank 18
- Question Bank 19