FREE PRACTICE QUIZ

Here is a free quiz!  This will give you an idea of the type of questions we have and the difficulty level we strive for at CISSPrep.  Note: this quiz resembles our "EXAMS" which are timed, just like the real exam.  Our Domain Quizzes are not timed.  You will have about 90 seconds per question, so choose carefully!

1 / 10

A systems vendor claims that it can guarantee protection of data being processed. What is the most effective way to verify this claim after the system has been deployed into production?

2 / 10

A user of your company’s website submits a General Data Protection Regulation request with a right to be forgotten clause cited as legal authority after posting defamatory information about several of your executives.  What is the best advice if there is no legal team to respond to this request?

3 / 10

In which case would the discovery phase of ethical penetration testing be unnecessary?

4 / 10

When building a cloud system to manage multiple edge devices, what should be used if one of the requirements is to have key management services provide the highest level of customer control over the encryption/decryption keys?

5 / 10

Real-time confirmation in a pay-as-you-go Secrets Manager that any given request to perform an action is allowed by the various defined privileges refers to which of the following?

6 / 10

What is needed when a system’s feedback loop and a logic model require an additional layer of due diligence?

7 / 10

The confidentiality of data in transit is most at risk of:

8 / 10

At which of the following phases of the software assurance process would sustainment, disposal, or decommissioning occur?

9 / 10

A number of key goal indicators (KGI) show that it takes an average of four months to successfully implement a change through the change management process. If you are facing a non-urgent but much needed change, the absence of which could create additional risks, what is the best approach to recommend?

10 / 10

The best way to ensure that a login ID and password combination is not disclosed during an authentication process is which of the following?

Your score is