isc2 sample questions

Quiz
•
Computers
•
Professional Development
•
Easy

Frank Gwada
Used 12+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of the risk management process?
To identify the Assess and mitigate risks
Answer explanation
The risk management process involves identifying, assessing, and mitigating risks to an acceptable level, rather than attempting to eliminate all risks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which module of security principles focuses on establishing guidelines for security behavior within an organization?
Module 1: Understand the Security Concepts of Information Assurance
Module 2: Understand the Risk Management Process
Module 3: Understand Security Controls
Module 5: Understand ISC2 Code of Ethics
Answer explanation
ISC2 Code of Ethics provides guidelines for ethical behavior related to security practices within an organization.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary focus of the module that involves the identification, analysis, and prioritization of incidents in incident response?
Module 1: Understand Incident Response
Module 2: Understand Business Continuity
Module 3: Understand Disaster Recovery
Answer explanation
Module 1 focuses on the incident response process, which includes the identification, analysis, and prioritization of incidents.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of physical access controls?
To restrict access to computer systems and networks
To secure physical locations and assets
To encrypt data transmissions
To prevent malware infections
Answer explanation
Physical access controls are designed to secure physical locations and assets, such as buildings, rooms, and equipment.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT one of the CIA triad principles of information security?
Confidentiality
Integrity
Availability
Reliability
Answer explanation
Reliability is not part of the CIA triad. It focuses on maintaining consistent performance, not security.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in the risk management process?
Implement risk mitigation strategies.
Identify and assess risks
Monitor and review risks.
Develop risk acceptance criteria.
Answer explanation
Identifying and assessing risks is the initial step to understand potential threats.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of control is most effective in preventing unauthorized physical access to a data center?
Preventive control
Detective control
Corrective control
Recovery control
Answer explanation
Preventive controls, like access control systems, actively stop unauthorized access.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Informática JRO RAM

Quiz
•
Professional Development
10 questions
Security Awareness Training

Quiz
•
Professional Development
15 questions
Module 1. Passive Reconnaissance

Quiz
•
Professional Development
17 questions
MOC 20744C-Securing Windows Server 2016 - Part 2

Quiz
•
Professional Development
10 questions
ITF - Quiz 14.3 - Authentication Factors

Quiz
•
Professional Development
14 questions
AWS101 #2

Quiz
•
University - Professi...
10 questions
System Ethical Hacking

Quiz
•
Professional Development
10 questions
Is Your AWS Cloud Well Architected

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade