- 1、本文档共8页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
CISSP 管理题目
安全管理知识域练习题
Related to information security, availability is the opposite of which of the following?
delegation
distribution
documentation
destruction
D
Related to information security, the guarantee that the message sent is the message received is an example of which of the following?
integrity
confidentiality
availability
identity
A
Which of the following is NOT an administrative control?
Logical access control mechanisms
Screening of personnel
Development of policies, standards, procedures and guidelines
Change control procedures
A
Which of the following describe elements that create reliability and stability in networks and systems and which assures that connectivity is accessible when needed?
Availability
Acceptability
Confidentiality
Integrity
A
Which one of the following individuals has PRIMARY responsibility for determining the classification level of information?
Security manager
User
Owner
Auditor
C
Which of the following groups represents the leading source of computer crime losses?
hackers
industrial saboteurs
foreign intelligence officers
employees
D
What is the main responsibility of information owner?
making the determination to decide what level of classification the information requires
running regular backups
audit the users when they access to the information
periodically checking the validity and accuracy for all data in the information system
A
What can be defined as an event that could cause harm to the information systems?
A risk
A threat
A vulnerability
A weakness
B
Which of the following is less likely to assist in ensuring availability?
Backups and redundant disk systems
Regular system and security audits
Reliable and interoperable security processes and network security mechanisms
Acceptable log-ins and operating process performances
B
Which of the following provides a minimum level of security acceptable for an environment?
A baseline
A standard
A procedure
A guideline
A
Who should provide access authorization to computerized information?
您可能关注的文档
- 5AU1,2,3,4 先学提纲.doc
- 5地下室底板集水坑、导墙、止水带等支模.doc
- 5第五章-保险公司业务经营环节.ppt
- 5B Unit4 A 说课.ppt
- 51CTO下载-第三节++必修之代理服务器.doc
- 4第四章 二烯烃.ppt
- 6位单片机电子钟.doc
- 5-5物体的颜色1.ppt
- 5S管理培训.ppt2.ppt
- 6年级阶段测试.doc
- 第18讲 第17课 西晋的短暂统一和北方各族的内迁.docx
- 第15讲 第14课 沟通中外文明的“丝绸之路”.docx
- 第13课时 中东 欧洲西部.doc
- 第17讲 第16 课三国鼎立.docx
- 第17讲 第16课 三国鼎立 带解析.docx
- 2024_2025年新教材高中历史课时检测9近代西方的法律与教化含解析新人教版选择性必修1.doc
- 2024_2025学年高二数学下学期期末备考试卷文含解析.docx
- 山西版2024高考政治一轮复习第二单元生产劳动与经营第5课时企业与劳动者教案.docx
- 第16讲 第15课 两汉的科技和文化 带解析.docx
- 第13课 宋元时期的科技与中外交通.docx
文档评论(0)