100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP EXAM QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
16-08-2024
Written in
2024/2025

CISSP EXAM QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Institution
CISSP
Course
CISSP










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP
Course
CISSP

Document information

Uploaded on
August 16, 2024
Number of pages
30
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISSP EXAM QUESTIONS AND
ANSWERS WITH SOLUTIONS 2024
CIA Triangle - ANSWER Cornerstone of infosec. Confidentiality, Integrity, Availability



Confidentiality (CIA Triangle) - ANSWER prevention of unauthorized disclosure of information; prevention
of unauthorized read access to data



Integrity (CIA Triangle) - ANSWER prevention of unauthorized modification of data; prevention of
unauthorized write access to data



Availability (CIA Triangle) - ANSWER ensures data is available when needed to authorized users



Opposing forces to CIA - ANSWER DAD: disclosure, alteration, destruction



identification - ANSWER the process by which a subject professes an identity and accountability is initiated;
ex: typing a username, swiping a smart card, waving a proximity device (badging in), speaking a phrase,
etc - always a two step process with authenticating



authentication - ANSWER verification that a person is who they say they are; ex: entering a password or
PIN, biometrics, etc - always a two step process with identifying



authorization - ANSWER verification of a person's access or privileges to applicable data



auditing (monitoring) - ANSWER recording a log of the events and activities related to the system and
subjects



accounting (accountability) - ANSWER reviewing log files to check for compliance and violations in order
to hold subjects accountable for their actions



non-repudiation - ANSWER a user cannot deny having performed a specific action

,subject - ANSWER an entity that performs active functions to a system; usually a person, but can also be
script or program designed to perform actions on data



object - ANSWER any passive data within the system



ISC2 Code of Ethics Canons (4) - ANSWER 1. protect society, commonwealth, infrastructure

2. act honorably, justly, responsibly, legally

3. provide diligent and competent service

4. advance and protect the profession



strictly applied in order; exam questions in which multiple canons could be the answer, choose the highest
priority per this order



policy - ANSWER mandatory high level management directives; components of policy



1. purpose: describes the need for policy

2. scope: what systems, people, facilities, organizations are covered

3. responsibilities: specific duties of involved parties

4. compliance: effectiveness of policy, violations of policy



procedure - ANSWER low level step by step guide for accomplishing a task



standard - ANSWER describes the specific use of technology applied to hardware or software; mandatory



guideline - ANSWER discretionary recommendations (e.g. not mandatory)



baseline - ANSWER a uniform way of implementing a standard



3 access/security control categories - ANSWER 1. administrative: implemented by creating org policy,
procedure, regulation. user awareness/training also fall here

, 2. technical: implemented using hardware, software, firmware that restricts logical access to a system

3. physical: locks, fences, walls, etc



preventive access control

(can be administrative, technical, physical) - ANSWER prevents actions from occurring by applying
restrictions on what a user can do. example: privilege level



detective access control

(can be administrative, technical, physical) - ANSWER controls that alert during or after a successful attack;
alarm systems, or closed circuit tv



corrective access control

(can be administrative, technical, physical) - ANSWER repairing a damaged system; often works hand in
hand with detective controls (e.g. antivirus software)



recovery access control

(can be administrative, technical, physical) - ANSWER controls to restore a system after an incident has
occurred;



deterrent access control

(can be administrative, technical, physical) - ANSWER deters users from performing actions on a system



compensating access control

(can be administrative, technical, physical) - ANSWER additional control used to compensate for
weaknesses in other controls as needed



risk formula - ANSWER risk = threat x vulnerability x impact



market approach (for calculating intangible assets) - ANSWER assumes the fair value of an asset reflects
the price which comparable assets have been purchased in transactions under similar circumstances

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Performance Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
314
Member since
1 year
Number of followers
36
Documents
15133
Last sold
10 hours ago

Welcome To my Store My Goal is to help you achieve your desired grades by providing credible study materials I'm happy to help you with quality documents On this page you will find quality study guides, Exams assignments, Research papers and Test Banks all verified correct . you'll find past and recent revised and verified study materials . Stay here and You'll find everything you need to pass !!! . I always ensure my documents are of high standards Be assured to get good grades and always leave a review after a purchase Refer a friend SUCCESS!!!

Read more Read less
4.4

216 reviews

5
128
4
60
3
19
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions