- Back to Home »
- (ISC)² , Certified Information System Security Professional , CISSP , Preparação para Certificação , Question Dump , Segurança da Informação »
- (ISC)² CISSP - Certified Information Systems Security Professional - Uma ajudinha nas perguntas da certificação em CISSP - Parte 4
(ISC)² CISSP - Certified Information Systems Security Professional - Uma ajudinha nas perguntas da certificação em CISSP - Parte 4
segunda-feira, 5 de maio de 2014
Quarta parte do question dump para o CISSP
Bom antes do exame convém sempre, para além da frequência do curso, ter alguma literatura:
- https://umeshume.files.wordpress.com/2013/03/mcgraw-hill-osborne-media-cissp-all-in-one-exam-guide-6th-edition-2012.pdf
Dar uma vista atenta a este link: http://opensecuritytraining.info/CISSP-Main.HTML
Question:
Which is not a task for senior management in disaster recovery?
A.Approve of final plans
B.Oversee budget
C.Drive all phases of plan
D.Implement the plans themselves
Answer:
D.Implement the plans themselves
Explanation:
Senior management should support all functions of disaster recovery and business continuity, and they should oversee the progress of developing, implementing, and testing the plans. They should also ensure that the proper resources and budget are available. But they are not usually the ones who actually implement the plans.
Question:
Which of the following issues is least important when quantifying risks associated with a potential disaster?
A.Gathering information from agencies that report the probability of certain natural disasters taking place in that area
B.Identifying the company’s key functions and business requirements
C.Identifying critical systems that support the company’s operations
D.Estimating the potential loss and impact the company would face based on how long the outage lasts
Answer:
A.Gathering information from agencies that report the probability of certain natural disasters taking place in that área
Explanation:
Information gathered from agencies that report the probability of certain natural disasters taking place in that area would be the least important out of this list.
Question:
Which of the following is the fourth step in a business impact analysis?
A.Identify the company's critical business functions.
B.Calculate how long these functions can survive without these resources.
C.Identify the resources these functions depend upon.
D.Calculate the risk for each different business function.
Answer:
B.Calculate how long these functions can survive without these resources.
Explanation:
The detailed steps of carrying out a business impact analysis are shown below:
. Select individuals to interview for data gathering.
. Create data-gathering techniques (surveys, questionnaires, qualitative and quantitative approaches).
. Identify the company's critical business functions.
. Identify the resources these functions depend upon.
. Calculate how long these functions can survive without these resources.
. Identify vulnerabilities and threats to these functions.
. Calculate the risk for each different business function.
. Document findings and report them to management.
Question:
Which of the following statements is true of a full-scale BCP?
A.It is a long-term project.
B.It is a short-term project.
C.It is a single entity venture.
D.BCP guarantees no service interruption.
Answer:
A.It is a long-term project.
Explanation:
A BCP plan is a long-term project and must have support from upper management. It could take a year or more for a small to medium-size business before the plan is implemented and fully tested.
Question:
A hot site offers ___ recovery with ____ costs.
A.Instant, high
B.Moderate, high
C.Instant, low
D.Moderate, low
Answer:
A.Instant, high
Explanation:
A hot site has all of the equipment in place and can allow fast recovery. However it is also the most expensive solution.
Question:
Sam is a manager that is responsible for overseeing the development and the approval of the business continuity plan. He needs to make sure that his team is creating a correct and all inclusive loss criteria when it comes to potential business impacts. Which of the following should not be included in this criteria?
i. Loss in reputation and public confidence
ii. Loss of competitive advantages
iii. Decrease in operational expenses
iv. Violations of contract agreements
v. Violations of legal and regulatory requirements
vi. Delayed income costs
vii. Loss in revenue
viii. Loss in productivity
A.i, ii
B.v, vi
C.v
D.iii
Answer:
D.iii
Explanation:
Loss criteria must be applied to the individual threats that were identified. The criteria should include at least the following:
- Loss in reputation and public confidence
- Loss of competitive advantages
- Increase in operational expenses
- Violations of contract agreements
- Violations of legal and regulatory requirements
- Delayed income costs
- Loss in revenue
- Loss in productivity
Question:
Part of operational recovery is designing backup facility configurations to work in an acceptable manner so that business can continue. Which of the following is a setup that allows services to be distributed over two or more in-house centers?
A.Hot site
B.Multi-processing center
C.Mobile site
D.Reciprocal agreements
Answer:
B.Multi-processing center
Explanation:
A multi-processing center allows a company to have backup over multiple facilities where services have been distributed.
Question:
Recovery strategies are pre-established and management-______ steps that should be put into action in the event of a disaster.
A.Approved
B.Directed
C.Requested
D.Documented
Answer:
A.Approved
Explanation:
Recovery strategies are planned ahead of time before they are needed. These strategies are approved by management and are tested.
Question:
Amy has been appointed to the BCP team and is in charge of information gathering for the business impact analysis. Amy could use any of the following tools to gather information, except:
A.Surveys
B.Questionnaires
C.Workshops
D.Quantitative formulas
Answer:
D.Quantitative formulas
Explanation:
Amy is only at the information gathering step at this stage. She would not be doing her quantitative or qualitative risk assessment yet.
Question:
Which of the following provides the correct characteristic for the specific data backup type?
A.Differential process backs up the files that have been modified since the last backup
B.Differential process backs up the files that have been modified since the last full backup
C.Incremental process sets the archive bit to 1
D.Differential process sets the archive bit to 1
Answer:
B.Differential process backs up the files that have been modified since the last full backup
Explanation:
A differential process backs up the files that have been modified since the last full backup. When the data need to be restored, the full backup is laid down first, and then the most recent differential backup is put down on top of it.
The differential process does not change the archive bit value. An incremental process backs up all the files that have changed since the last full or incremental backup and sets the archive bit to 0.
Parte 1: http://e-forense.blogspot.com/2014/05/isc-cissp-certified-information-systems.html
Parte 2: http://e-forense.blogspot.com/2014/05/isc-cissp-certified-information-systems_1.HTML
Parte 3: http://e-forense.blogspot.com/2014/05/isc-cissp-certified-information-systems_2.HTML
Parte 5: http://e-forense.blogspot.com/2014/05/isc-cissp-certified-information-systems_8.html
Parte 6: http://e-forense.blogspot.com/2014/05/isc-cissp-certified-information-systems_9.html
