![Reduce Cyber Risk Podcast artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts113/v4/b4/0c/8b/b40c8be3-5be6-580e-d06b-465f73bb8141/mza_9221924626890373133.png/100x100bb.jpg)
RCR 060 - How to Prepare with CISSP Sample Questions (Domain 1)
Reduce Cyber Risk Podcast
English - January 15, 2020 23:00 - 5 minutes - 9.29 MB - ★★★★★ - 16 ratingsTechnology Business cybersecurity cissp cybersecuritycourse cybersecurityforbeginners cybersecurityfundamentals cybersecuritynews cybersecuritytraining isc2 itsecurity learncybersecurityfree Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.
In this episode, Shon will talk about questions for Domain 1 (Security and Risk Management) of the CISSP Exam.
BTW - Get access to all my CISSP Training Courses here at: https://shongerber.com/
CISSP Exam Questions
Question: 063
When seeking to hire new employees, what is the first step?
A) Create a job description. B) Set position classification. C) Screen candidates. D) Request resumes.Answer: A. Create a job description.
The first step in hiring new employees is to create a job description. Without a job description, there is no consensus on what type of individual needs to be found and hired.
Source: From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>
------------------------------------
Question: 064
Which of the following describes the freedom from being observed, monitored, or examined without consent or knowledge?
A) Integrity B) Privacy C) Authentication D) AccountabilityAnswer: [b] Privacy - One definition of privacy is freedom from being observed, monitored, or examined without consent or knowledge.
Source: From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>
------------------------------------
Question: 065
Which of the following is typically not a characteristic considered when classifying data?
A) Value B) Size of object C) Useful lifetime D) National security implicationsAnswer: [b] Size of object - Size is not a criterion for establishing data classification. When classifying an object, you should take value, lifetime, and security implications into consideration.
From <https://www.brainscape.com/flashcards/information-security-guidelines-and-risk-973829/packs/1774328>
------------------------------------
Want to find Shon elsewhere on the internet?
LinkedIn – www.linkedin.com/in/shongerber
Facebook - https://www.facebook.com/CyberRiskReduced/
LINKS:
ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-ResourcesShon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.
In this episode, Shon will talk about questions for Domain 1 (Security and Risk Management) of the CISSP Exam.
BTW - Get access to all my CISSP Training Courses here at: https://shongerber.com/
CISSP Exam Questions
Question: 063
When seeking to hire new employees, what is the first step?
A) Create a job description. B) Set position classification. C) Screen candidates. D) Request resumes.Answer: A. Create a job description.
The first step in hiring new employees is to create a job description. Without a job description, there is no consensus on what type of individual needs to be found and hired.
------------------------------------
Question: 064
Which of the following describes the freedom from being observed, monitored, or examined without consent or knowledge?
A) Integrity B) Privacy C) Authentication D) AccountabilityAnswer: [b] Privacy - One definition of privacy is freedom from being observed, monitored, or examined without consent or knowledge.
------------------------------------
Question: 065
Which of the following is typically not a characteristic considered when classifying data?
A) Value B) Size of object C) Useful lifetime D) National security implicationsAnswer: [b] Size of object - Size is not a criterion for establishing data classification. When classifying an object, you should take value, lifetime, and security implications into consideration.
------------------------------------
Want to find Shon elsewhere on the internet?
LinkedIn – www.linkedin.com/in/shongerber
Facebook - https://www.facebook.com/CyberRiskReduced/
LINKS:
ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources