ISC2
ISSMP
Q1:
Fill in the blank with an appropriate word. _________ are used in information security to formalize security policies.
○
A
Models.
ISC2
ISSMP
Q2:
Which of the following sites are similar to the hot site facilities, with the exception that they are completely dedicated, self-developed recovery facilities?
○
A
Cold sites○
B
Orange sites○
C
Warm sites○
D
Duplicate processing facilities
ISC2
ISSMP
Q3:
Which of the following divisions of the Trusted Computer System Evaluation Criteria (TCSEC) is based on the Mandatory Access Control (MAC) policy?
○
A
Division A○
B
Division D○
C
Division B○
D
Division C
ISC2
ISSMP
Q4:
Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?
○
A
Senior Management○
B
Business Unit Manager○
C
Information Security Steering Committee○
D
Chief Information Security Officer
ISC2
ISSMP
Q5:
Which of the following liabilities is a third-party liability in which an individual may be responsible for an action by another party?
○
A
Relational liability○
B
Engaged liability○
C
Contributory liability○
D
Vicarious liability