O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. During a periodical review of information security controls and their effectiveness in a corporation,  that a file was found to be containing privacy-related data in a publicly accessible location. Which one of the following is ultimately responsible for such a security violation?

  1. Data user
  2. Data custodian
  3. Data owner
  4. Data auditor

Q2. ______ is a cryptographic method in which plain text is scrambled to form a scrambled text that is not directly readable without unscrambling.

  1. Hashing
  2. Transposition
  3. Transformation
  4. Encryption

Q3. Which one of the following is a malicious threat?

  1. Software weakness
  2. Wrong configuration
  3. Botnet
  4. Weak encryption

Q4. Which one of the following is a Recovery Time Objective (RTO)?

  1. Recovery of data that was processed up to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required