RCR 061: Best CISSP Exam Questions for Test Preparation (Domain 1) - CISSP Training and Study!

cissp cissp domains cissp exam guide cissp exam questions cissp for dummies cissp prep cissp salary cissp study guide cissp syllabus cissp training cissp training free cybersecurity isc2 cissp Jan 18, 2020
CISSP Cyber Training
RCR 061: Best CISSP Exam Questions for Test Preparation (Domain 1) - CISSP Training and Study!
5:28
 

 

Description:

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will talk about questions for Domain 1 (Security and Risk Management) of the CISSP Exam.

CISSP Exam Questions

 

Question:  066

Which of the following would generally not be considered an asset in a risk analysis?

A) A development process

B) An IT infrastructure

C) A proprietary system resource

D) Users' personal files

 

Answer: [D] Users' personal files - The personal files of users are not usually considered assets of the organization and thus are not considered in a risk analysis.

From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

------------------------------------

 

Question:  067

You've performed a basic quantitative risk analysis on a specific threat/vulnerability/risk relation. You select a possible countermeasure. When performing the calculations again, which of the following factors will change?

A) Exposure factor

B) Single loss expectancy

C) Asset value

D) Annualized rate of occurrence

 

Answer: [d] Annualized rate of occurrence - A countermeasure directly affects the annualized rate of occurrence, primarily because the countermeasure is designed to prevent the occurrence of the risk, thus reducing its frequency per year.

From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

------------------------------------

 

Question:  068

What ensures that the subject of an activity or event cannot deny that the event occurred?

A) CIA Triad

B) Abstraction

C) Nonrepudiation

D) Hash totals

 

Answer: [c] Nonrepudiation - Nonrepudiation ensures that the subject of an activity or event cannot deny that the event occurred.

From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>

 ------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS: 

 

TRANSCRIPT:

Welcome introduce Cerberus podcast 61 cissp exam questions domain 1 reduce Severus podcast where we provide you the training tools you need to pass the cissp exam while enhancing your cybersecurity career hi my name is Sean Gerber and I'm your host of this action-packed informative podcast join me each week is I provide the information you need to grow your cybersecurity knowledge so that you're better prepared to pass the cissp exam real Sean Gerber again with reduce cyber risk and Sean gerber.com hope everybody is doing wonderful this beautiful day and hope you're having a great time studying for your cissp exam yet I say that you're probably just going to shut up I'm tired of studying for this thing yeah it's it's challenging that just no question about it but you got to do it especially if you want to make the big money pathan the cybersecurity space and then get into those cybersecurity world you need to get it done so let's just do it right all right so it's growing some exam questions for domain 1 all right question number one which of the following would generally not be considered an asset in Risk analysis okay for brainscape out for brainscape escape and check out their flashcards and just you can study those to your heart's content good stuff out there for that alright so which of the following would generally not be considered an asset in Risk analysis development process it infrastructure proprietary system resource 4D users per personal files okay so get which of the following would generally not underline not what we talked about before don't by then. Don't don't go Grey's past that be considered an asset in Risk analysis the answer is personal files okay personal files assets an organization because you can take them with you unless you create personal out the files for the company I guess I don't know but I think that would not really typically considered an asset of the company but you do need to understand those when you do a risk analysis because you don't want those breeches especially if you're dealing with gdpr and other privacy aspects you and make sure that those are well protected question to you been you perform a basic qualitative and quantitative risk analysis on a very specific threat or vulnerability or risk relation you select a possible countermeasure and when performing the calculations of which of the following factors will change exposure Factor single loss expectancy or SLE x-ray Echo SLE seized asset value annual rate of occurrence so you're doing a basic quantitative risk analysis on a specific risk vulnerability or risk relation you so like a possible countermeasure the when performing calculations again after the countermeasure you selected which of the following factors will change exposure single loss expectancy asset value or annualized rate of occurrence it is DNA analyzed rate of occurrence that countermeasure will affect it so as it affects that you're going to have it will affect the rate of occurrence that you could expect to see so therefore that would be the one that would quit change the subject of an activity or event cannot deny that the event occur CIA Triad triangle try you the abstraction 9 Refugee or c c non-repudiation d hack total pictures of subject of the activity or event cannot deny that the event occurred that would be seen on repudiation pictures of the subject activity of the event cannot deny that the event occur that's what it is check me out at Shawn gerber.com you can get access to my cissp questions along with all the other day that I have out there you need access to my cas is available for you to purchase and by doing that you also get access to meet and I'll be happy to help you in any possible way I can to pass the cissp exam and move on with your cyber security professional all right have a wonderful day it will catch you on the flip side senior so much for joining me today on my podcast would you heard please leave a review on iTunes I would greatly appreciate the feedback also check out my cissp videos that you can find out on YouTube just search for Shawn s h o n Gerber like the baby food toilet or whatever you choose and then you will find a plethora of content to help you pass the exam Lashley head over to Sean gerber.com and look at the Cornucopia free CIA cereals available to all my emails thanks again for listening

CISSP Cyber Training Academy Program!

Are you an ambitious Cybersecurity or IT professional who wants to take your career to a whole new level by achieving the CISSP Certification? 

Let CISSP Cyber Training help you pass the CISSP Test the first time!

LEARN MORE | START TODAY!