Skip survey header

CISSP Practice Quiz: All Domains Quiz 1

CISSP Practice Quiz: All Domains Quiz 1

1. The Twofish algorithm will XOR the plaintext with a subkey before the first round of encryption begins. What is this known as?
2. Supply chain risk management (SCRM) often takes into account time to recover and which of the following?
3. California’s SB 1386 requires notification to individuals if their personal information was believed to be accessed by unauthorized individuals and that information is which of the following?
4. Which of the following is a business-focused framework that defines processes for IT management, including security?
5. Which type of cipher uses an encryption algorithm to rearrange letters of a plaintext message into ciphertext?
6. Having multiple controls in a series is known as layering or which of the following?
7. Software license agreements that are activated/effective once the user opens a package are known as which of the following?
8. A geographically distributed network of proxy servers and their data centers — of which BitTorrent would be an example — is classified as which of the following?
9. Which of the following is cloud-based or on-premises software that sits between cloud service users and cloud applications, monitors their activity and enforces implemented security policies?
10. Which of the following prevents an individual from being able to secure exclusive control/use of a system?