Here are 10 questions to help give you a sense of your knowledge.
Once this test is complete you will have the ability to see a video with explanations to the questions you just received answered.
In addition, you will begin receiving various emails that will help you pass the CISSP Exam the first time.
Thanks for joining the CISSP Cyber Training team.
Click the button below to start.
Question 1 of 10
001 - Practice CISSP Exam Question
If a security mechanism offers confidentiality, then it offers a high level of assurance that authorized subjects can ________________ the data, objects, and resources.
Question 2 of 10
002 - Practice CISSP Exam Question
When is Confidentiality compromised?
Data shipped in plain text or stored unprotected without various protections in place (Access Controls, Encryption, etc.)
Data is shipped when the circuit is complete
Data is transmitted or stored in an unprotected container
Data is unable to reach its destination due to the circuit being down
Question 3 of 10
003 - Practice CISSP Exam Question
When looking to maintain confidentiality of user credentials the use of an spreadsheet for password storage is the best option.
Question 4 of 10
004 - Practice CISSP Exam Question
When considering the data owner for an application or the data itself, who would be the Best owner of the data?
Business Owner / IP Owner
Question 5 of 10
005 - Practice CISSP Exam Question
Common passwords are shared with others in an organization. As you are studying for your CISSP exam, what part of the CIA triangle is compromised through this action?
All of the Above
Question 6 of 10
006 - Practice CISSP Exam Question
Ensuring that the Integrity of the data, which answer below best meets that description?
Data cannot be modified in an unauthorized or undetected manner
Data cannot be modified in an authorized or detected manner
Data can be modified in an unauthorized or undetected manner
None of the above
Question 7 of 10
007 - Practice CISSP Exam Question
What is a security mechanism that is typically put in place to ensure that data is not compromised?
Intrusion Detection Systems (IDS)
Host Based Intrusion Detection Systems (HBIDS)
Question 8 of 10
008 - Practice CISSP Exam Question
When a device/capability is considered High Availability, it means that the system must remain available:
Most of the time
Large Part of the time
Only when it is necessary
All of the time
Question 9 of 10
009 - Practice CISSP Exam Question
Availability is compromised when a Denial of Service occurs and is:
Adequate protections are implemented
A system has Nonrepudiation enabled
Question 10 of 10
010 - Practice CISSP Exam Question
Layering of security protections and/or various network resources is commonly called:
7 Layer OSI Model (aka. Burrito)
Defense in Depth
None of the Above