欢迎来到天天文库
浏览记录
ID:37332049
大小:52.50 KB
页数:8页
时间:2019-05-21
《CISSP 管理题目》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、安全管理知识域练习题1.Relatedtoinformationsecurity,availabilityistheoppositeofwhichofthefollowing?a)delegationb)distributionc)documentationd)destructionD2.Relatedtoinformationsecurity,theguaranteethatthemessagesentisthemessagereceivedisanexampleofwhichofthefollowin
2、g?a)integrityb)confidentialityc)availabilityd)identityA3.WhichofthefollowingisNOTanadministrativecontrol?a)Logicalaccesscontrolmechanismsb)Screeningofpersonnelc)Developmentofpolicies,standards,proceduresandguidelinesd)ChangecontrolproceduresA4.Whichofthef
3、ollowingdescribeelementsthatcreatereliabilityandstabilityinnetworksandsystemsandwhichassuresthatconnectivityisaccessiblewhenneeded?a)Availabilityb)Acceptabilityc)Confidentialityd)IntegrityA5.WhichoneofthefollowingindividualshasPRIMARYresponsibilityfordete
4、rminingtheclassificationlevelofinformation?a)Securitymanagerb)Userc)Ownerd)AuditorC6.Whichofthefollowinggroupsrepresentstheleadingsourceofcomputercrimelosses?a)hackersb)industrialsaboteursc)foreignintelligenceofficersd)employeesD7.Whatisthemainresponsibil
5、ityofinformationowner?a)makingthedeterminationtodecidewhatlevelofclassificationtheinformationrequiresb)runningregularbackupsc)audittheuserswhentheyaccesstotheinformationd)periodicallycheckingthevalidityandaccuracyforalldataintheinformationsystemA2.Whatcan
6、bedefinedasaneventthatcouldcauseharmtotheinformationsystems?a)Ariskb)Athreatc)Avulnerabilityd)AweaknessB3.Whichofthefollowingislesslikelytoassistinensuringavailability?a)Backupsandredundantdisksystemsb)Regularsystemandsecurityauditsc)Reliableandinteropera
7、blesecurityprocessesandnetworksecuritymechanismsd)Acceptablelog-insandoperatingprocessperformancesB4.Whichofthefollowingprovidesaminimumlevelofsecurityacceptableforanenvironment?a)Abaselineb)Astandardc)Aprocedured)AguidelineA5.Whoshouldprovideaccessauthor
8、izationtocomputerizedinformation?a)Databaseadministratorb)Securityadministratorc)Dataownerd)NetworkadministratorC6.Ifriskisdefinedas"thepotentialthatagiventhreatwillexploitvulnerabilitiesofanassetorgroupofassetstoca
此文档下载收益归作者所有