Skip survey header

CISSP Practice Quiz 3

CISSP Practice Quiz 3

1. Which of the following is a popular software threat modeling tool? 
2. What is a benefit of open source development?  
3. What is a geographic area that a given legal body (a court or legislature, or both) claims control of called? 
4. Which of the following is a technological control solution for protecting intellectual property and sensitive data, usually at the file level, which often functions by adding an additional layer of access control to protected files? 
5. Various privacy laws list many types of information that must be controlled. Which of the following is not included in any of those laws?  
6. Privacy laws in many jurisdictions have a component that requires an entity that has an inadvertent/unauthorized release of personal information to report the incident (usually to the person(s) identified by the information, regulators, or both). This is called ________.  
7. What is the entity collecting PII known as? 
8. Alice and Bob want to exchange protected communications. 
 Alice wants to send a message and ensure that Bob knows it came from Alice. This is called ___________. 
9. Alice and Bob work for the same company, Ostrich Interactive, which is a midsize online gaming company. Alice works on graphics for a game called Ugly Albatross; Bob works on player interactivity for a game called Emu You. 

The billing department of Ostrich Interactive is probably most concerned with ensuring compliance with _________.  
10. Bob and Alice are friends who work at the same company. They each have the same permissions to work with sensitive data (clearance level) and are system administrators. They work on different projects, for different departments. Bob has a problem making his system perform a certain function, but he is not allowed to ask for help from Alice. What principle is this an example of?