check

[email protected]

Here are 10 questions to help give you a sense of your knowledge.

Once this test is complete you will have the ability to see a video with explanations to the questions you just received answered.

In addition, you will begin receiving various emails that will help you pass the CISSP Exam the first time. 

Thanks for joining the CISSP Cyber Training team.  

- Shon

Click the button below to start.

Start

Question 1 of 10

001 - Practice CISSP Exam Question

If a security mechanism offers confidentiality, then it offers a high level of assurance that authorized subjects can ________________ the data, objects, and resources.

A

Manage

B

Mitigate

C

Secrecy

D

Due Diligence

Question 2 of 10

002 - Practice CISSP Exam Question

When is Confidentiality compromised?

A

Data shipped in plain text or stored unprotected without various protections in place (Access Controls, Encryption, etc.)

B

Data is shipped when the circuit is complete

C

Data is transmitted or stored in an unprotected container

D

Data is unable to reach its destination due to the circuit being down

Question 3 of 10

003 - Practice CISSP Exam Question

When looking to maintain confidentiality of user credentials the use of an spreadsheet for password storage is the best option.  

A

True

B

False

Question 4 of 10

004 - Practice CISSP Exam Question

When considering the data owner for an application or the data itself, who would be the Best owner of the data?

A

CIO

B

CTO

C

Business Owner / IP Owner

D

IT Organization

Question 5 of 10

005 - Practice CISSP Exam Question

Common passwords are shared with others in an organization.  As you are studying for your CISSP exam, what part of the CIA triangle is compromised through this action?

A

Confidentiality

B

Availability

C

Integrity

D

All of the Above

Question 6 of 10

006 - Practice CISSP Exam Question 

Ensuring that the Integrity of the data, which answer below best meets that description?

A

Data cannot be modified in an unauthorized or undetected manner

B

Data cannot be modified in an authorized or detected manner

C

Data can be modified in an unauthorized or undetected manner

D

None of the above

Question 7 of 10

007 - Practice CISSP Exam Question 

What is a security mechanism that is typically put in place to ensure that data is not compromised?

A

Honeypots

B

Intrusion Detection Systems (IDS)

C

Encryption

D

Host Based Intrusion Detection Systems (HBIDS)

Question 8 of 10

008 - Practice CISSP Exam Question 

When a device/capability is considered High Availability, it means that the system must remain available:

A

Most of the time

B

Large Part of the time

C

Only when it is necessary

D

All of the time

Question 9 of 10

009 - Practice CISSP Exam Question 

Availability is compromised when a Denial of Service occurs and is:

A

Mitigated

B

Not Mitigated

C

Adequate protections are implemented

D

A system has Nonrepudiation enabled

Question 10 of 10

010 - Practice CISSP Exam Question

Layering of security protections and/or various network resources is commonly called:

A

7 Layer OSI Model (aka. Burrito)

B

Honeypots

C

Defense in Depth

D

None of the Above

Confirm and Submit