O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. Which one of the following is not a cryptographic method for securing data?

  1. Encryption
  2. Digital media
  3. Hashing
  4. Digital signature

Q2. Which one of following is not a commonly used data state definition?

  1. Data at rest
  2. Data in the cloud
  3. Data in use
  4. Data in motion

Q3. Drag appropriate statements to the box on the right-hand side that pertain to the data handling policy of sensitive information, such as PII.

Sample questions

Q4. Which one of the following policies is the least secure? Place a tick mark on the appropriate circle.

Sample questions

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required