Skip survey header

CISSP Practice Quiz: Domain 1: Security and Risk Management Quiz 2

CISSP Practice Quiz: Domain 1: Security and Risk Management Quiz 2

1. Gina is conducting a business impact analysis for the threat of an earthquake damaging her facility. She consults with experts and determines that there is a 1 percent risk of a significant earthquake in any given year. The facility is valued at $10,000,000 and Gina estimates that the earthquake would cause approximately $1,000,000 in damage.

What is the SLE in this scenario?
2. Gina is conducting a business impact analysis for the threat of an earthquake damaging her facility. She consults with experts and determines that there is a 1 percent risk of a significant earthquake in any given year. The facility is valued at $10,000,000 and Gina estimates that the earthquake would cause approximately $1,000,000 in damage.

What is the ARO in this scenario?
3. Gina is conducting a business impact analysis for the threat of an earthquake damaging her facility. She consults with experts and determines that there is a 1 percent risk of a significant earthquake in any given year. The facility is valued at $10,000,000 and Gina estimates that the earthquake would cause approximately $1,000,000 in damage.

What is the ALE in this scenario?
4. Gina is conducting a business impact analysis for the threat of an earthquake damaging her facility. She consults with experts and determines that there is a 1 percent risk of a significant earthquake in any given year. The facility is valued at $10,000,000 and Gina estimates that the earthquake would cause approximately $1,000,000 in damage.

What is the AV in this scenario?
5. Brian recently purchased a cybersecurity insurance policy that will cover his organization’s expenses in the event of a data breach. What risk management strategy is Brian pursuing?
6. Helen is designing a security document that will include optional advice to administrators of Windows systems. What type of document is she creating?
7. Which one of the following is not a canon of the (ISC)² code of ethics?
8. Frances would like to ensure that a book she wrote is protected from unauthorized duplication. What type of intellectual property protection is most appropriate?
9. Barry’s organization recently entered into a partnership with a healthcare system to perform analytics on patient data. The compliance team at the customer organization is asking Barry to sign a business associate agreement (BAA).

What regulation requires this agreement?
10. Darren is deploying full disk encryption on all of the laptops belonging to his organization. What security goal is he most likely attempting to meet?