[i] Domain 1 of the CISSP exam covers Security and Risk Management, which is a broad area encompassing various aspects of information security, including concepts related to governance, risk management, compliance, law, ethics, and security education.
Here are some practice questions related to Domain 1:
[q multiple_choice=”true”] Which of the following best describes the purpose of risk management in an organization’s security strategy?
[c]IEEpIFRvIGVsaW1pbm F0ZSBhbGwgcmlza3MuCg==[Qq][f]Cg==[Qq][c]IEIpIFRvIGFzc2VzcyBhbmQgbWl0aWdhdGUgcmlza3MgdG8gYW4gYWNjZXB0YWJsZSBsZXZlbC4=Cg==[Qq][f]IFNvcnJ5LCB0aGF0JiM4MjE3O3Mgbm90IGNvcnJlY3Qu[Qq]
[c]IEMpIFRvIHRyYW5zZmVyIGFsbCByaXNrcyB0byBhIHRoaXJkIHBhcnR5Lg==Cg==[Qq][f]IFNvcnJ5LCB0aGF0JiM4MjE3O3Mgbm90IGNvcnJlY3Qu[Qq]
[c]IEQpIFRvIGlnbm9yZSByaXNrcyB0aGF0IGFyZSBkZWVtZWQgbG93Lg==Cg==[Qq][f]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Cg==[Qq][q multiple_choice=”true”] What is the primary goal of an information security governance program? [c]IEEpIFRvIGVuc3VyZSB0aGF0IHNlY3VyaXR5IHBvbGljaWVzIGFyZSB0ZWNobmljYWxseSBlbmZvcmNlZC4=Cg==[Qq][f]IFNvcnJ5LCB0aGF0JiM4MjE3O3Mgbm90IGNvcnJlY3Qu[Qq]
[c]IEIpIFRvIGVuc3VyZSB0aGF0IHRoZSBvcmdhbml6YXRpb24mIzgyMTc7cyBzZWN1cml0eSBwb2xpY2llcyBhbmQg cHJhY3RpY2VzIHJlZmxlY3QgaXRzIG9iamVjdGl2ZXMgYW5kIGFyZSBhbGlnbmVkIHdpdGggcmVndWxhdGlvbnMuCg==[Qq][f]IEdvb2Qh[Qq]
[c]IEMpIFRvIGltcGxlbWVudCB0aGUgbW9zdCBhZHZhbmNlZCB0ZWNobm9sb2dpY2FsIHNlY3VyaXR5IGNvbnRyb2xzLg==Cg==[Qq][f]IE5vLCB0aGF0JiM4MjE3O3Mgbm90IGNvcnJlY3Qu[Qq]
[c]IEQpIFRvIHRyYWluIGVtcGxveWVlcyBvbiB0aGUgbGF0ZXN0IGN5YmVyc2VjdXJpdHkgdGhyZWF0cy4=Cg==[Qq][f]IEluZm9ybWF0aW9uIHNlY3VyaXR5IGdvdmVybmFuY2UgaXMgYSBzdWJzZXQgb2YgZW50ZXJwcmlzZSBnb3Zlcm5hbmNlIHRoYXQgcHJvdmlkZXMgc3RyYXRlZ2ljIGRpcmVjdGlvbiwgZW5zdXJlcyBvYmplY3RpdmVzIGFyZSBhY2hpZXZlZCwgbWFuYWdlcyByaXNrIGFwcHJvcHJpYXRlbHksIHVzZXMgb3JnYW5pemF0aW9uYWwgcmVzb3VyY2VzIHJlc3BvbnNpYmx5LCBhbmQgZW5zdXJlcyB0aGF0IHRoZSBvcmdhbml6YXRpb24mIzgyMTc7cyBzZWN1cml0eSBwcmFjdGljZXMgYXJlIGFsaWduZWQgd2l0aCBpdHMgb3ZlcmFsbCBnb2Fscywgb2JqZWN0aXZlcywgYW5kIHJlZ3VsYXRvcnkgcmVxdWlyZW1lbnRzLg==Cg==[Qq][q multiple_choice=”true”] Which of the following laws requires U.S. federal agencies to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency?
[c]IEEpIFNhcmJhbmVzLU94bGV5IEFjdA==Cg==[Qq][f]IFNvcnJ5LCBuby4=[Qq]
[c]IEIpIEhlYWx0aCBJbnN1cmFuY2UgUG9ydGFiaWxpdHkgYW5kIEFjY291bnRhYmlsaXR5IEFjdCAoSElQQUEpCg==[Qq][f]IFNvcnJ5LCBuby4=[Qq]
[c]IEMpIEZlZGVyYWwgSW5mb3JtYXRpb24gU2VjdX JpdHkgTWFuYWdlbWVudCBBY3QgKEZJU01BKQ==Cg==[Qq][f]IEZJU01BIHJlcXVpcmVzIFUuUy4gZmVkZXJhbCBhZ2VuY2llcyB0byBkZXZlbG9wLCBkb2N1bWVudCwgYW5kIGltcGxlbWVudCBhbiBhZ2VuY3ktd2lkZSBwcm9ncmFtIHRvIHByb3ZpZGUgaW5mb3JtYXRpb24gc2VjdXJpdHkgZm9yIHRoZSBpbmZvcm1hdGlvbiBhbmQgaW5mb3JtYXRpb24gc3lzdGVtcyB0aGF0IHN1cHBvcnQgdGhlIG9wZXJhdGlvbnMgYW5kIGFzc2V0cyBvZiB0aGUgYWdlbmN5LCBpbmNsdWRpbmcgdGhvc2UgcHJvdmlkZWQgb3IgbWFuYWdlZCBieSBhbm90aGVyIGFnZW5jeSwgY29udHJhY3Rvciwgb3Igb3RoZXIgc291cmNlLg==Cg==[Qq][c]IEQpIEdyYW1tLUxlYWNoLUJsaWxleSBBY3Q=Cg==[Qq][f]Cg==[Qq][x]Thank you for your attempt
[restart] [/qwiz]
