CISSP CBK Final Review

Exit

Question 1 of 1

  Time Left


0 [{"id":35638,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:43:03","updated_at":"2016-03-12 19:02:25","questionName":"Which of the following is the primary goal of a security awareness program?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35637,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:42:07","updated_at":"2016-03-12 19:02:25","questionName":"A type cryptographic attack where it is based on the probability of two different messages using the same hash function to produce the same message digest is?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35632,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:36:59","updated_at":"2016-03-12 19:02:25","questionName":"What is the inverse of confidentiality, integrity, and availability (C.I.A.) triad in risk management?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35640,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:44:41","updated_at":"2016-03-12 19:02:25","questionName":"When engaging an external contractor for a software development project, source code escrow can be used to protect against\u2026?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35641,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:45:22","updated_at":"2016-03-12 19:02:25","questionName":"Which of the followings is an example of simple substitution algorithm?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35639,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:43:49","updated_at":"2016-03-12 19:02:25","questionName":"Which of the following characteristics is not of a good stream cipher?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35635,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:40:07","updated_at":"2016-03-12 19:02:25","questionName":"What type of cryptanalytic attack where an adversary has the least amount of information to work with?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":36371,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-24 00:49:19","updated_at":"2016-03-12 19:02:25","questionName":"If a relation refers to a key attribute of a different or same relation, then that key element must exist.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35629,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:34:04","updated_at":"2016-03-12 19:02:25","questionName":"As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $1 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10%","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35631,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:36:20","updated_at":"2016-03-12 19:02:25","questionName":"A system security engineer is evaluation methods to store user passwords in an information system, so what may be the best method to store user passwords and meeting the confidentiality security objective?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35633,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:38:04","updated_at":"2016-03-12 19:02:25","questionName":"Company X is planning to implement rule based access control mechanism for controlling access to its information assets, what type of access control is this usually related to?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35636,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:41:34","updated_at":"2016-03-12 19:02:25","questionName":"What determines the assignment of data classifications in a mandatory access control (MAC) philosophy?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35634,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:38:49","updated_at":"2016-03-12 19:02:25","questionName":"In the Common Criteria Evaluation and Validation Scheme (CCEVS), requirements for future products are defined by:","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":36372,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-24 00:51:02","updated_at":"2016-03-12 19:02:25","questionName":"Which key concept is Referential Integrity Constraint associated with?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":35630,"quiz_id":"3211","answer_id":null,"answerType_id":"0","created_at":"2016-02-21 14:35:11","updated_at":"2016-03-12 19:02:25","questionName":"In a typical information security program, what is the primary responsibility of information (data) owner?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
35638
0
120
block

Which of the following is the primary goal of a security awareness program?

Select the correct answer(s).  

(0/0)












35637
0
120
none
35632
0
120
none
35640
0
120
none
35641
0
120
none
35639
0
120
none
35635
0
120
none
36371
0
120
none
35629
0
120
none
35631
0
120
none
35633
0
120
none
35636
0
120
none
35634
0
120
none
36372
0
120
none
35630
0
120
none