O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. An access violation is called:

  1. Data Encryption Standard
  2. Procedure
  3. Incident management
  4. Incident

Q2. A systematic and procedural way of managing incidents is known as:

  1. Configuration management
  2. Incident management
  3. Change management
  4. System management

Q3. If an event could possibly violate information security, then such an event is known as:

  1. Problem
  2. Confidentiality breach
  3. Incident
  4. Integrity breach

Q4. A full test in a disaster recovery testing is called:

  1. A functional drill
  2. Simulation test
  3. Emulates real emergency or disaster scenario
  4. All of the above

Q5. Providing wrong inputs to the system can be classified as:

  1. Problem
  2. Vulnerability
  3. Incident
  4. Threat

Q6. A periodical mock test rehearsing the steps of actions to be taken during an emergency is also known ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required