100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP OSG QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Rating
-
Sold
-
Pages
40
Grade
A+
Uploaded on
17-08-2024
Written in
2024/2025

CISSP OSG QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Institution
CISSP
Course
CISSP











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP
Course
CISSP

Document information

Uploaded on
August 17, 2024
Number of pages
40
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISSP OSG QUESTIONS AND ANSWERS
WITH SOLUTIONS 2024
What are the three common types of security evaluation? - ANSWER Risk Assessment, Vulnerability
Assessment and Penetration testing



What is a risk assessment? - ANSWER Risk assessment is the process of identifying assets , threats, and
vulnerabilities, and then using that information to calculate risk



What is a vulnerability assessment? - ANSWER A vulnerability assessment uses automated tools to locate
known security weaknesses, which can be addressed by adding in more defences or adjusting existing
protections



What is penetration testing? - ANSWER Penetration testing uses trusted individuals to stress-test the
security infrastructure to find issues that may not be discovered by other means.



What is confidentiality? - ANSWER Confidentiality is the concept of the measures used to ensure the
protection of the secrecy of data, objects, or resources



What is the goal of confidentiality? - ANSWER Prevent or minimize unauthorized access to data.



Encryption, network traffic padding, strict access control, rigorous authentication procedures data
classification help support what? - ANSWER Confidentiality



What is sensitivity? - ANSWER Sensitivity refers to the quality of information, which could harm or
damage if disclosed



What is discretion? - ANSWER Discretion is an act of decision where an operator can influence or control
disclosure in order to minimise harm or damage



What is criticality? - ANSWER The level to which information is mission critical is its measure of criticality,
the more likely the need to maintain the confidentiality of the information

,What is concealment? - ANSWER Concealment is the act of hiding or preventing disclosure.



What is secrecy? - ANSWER Secrecy is the act of keeping something a secret or preventing the disclosure
of information



What is privacy? - ANSWER Privacy refers to keeping information confidential that is personally
identifiable or that might cause harm, embarrassment, or disgrace to someone if revealed



What is seclusion? - ANSWER Seclusion involves storing something in an out-of-the-way location, likely
with strict access controls



What is isolation? - ANSWER Isolation is the act of keeping something separated from others



What is integrity? - ANSWER Integrity is the concept of protecting the reliability and correctness of data.



What does integrity protection prevent? - ANSWER Integrity protection prevents unauthorised
alterations of data



What are 5 countermeasures to ensure integrity against possible threats? - ANSWER Strict access
controls, rigorous authentication procedures, intrusion detection systems, object/data encryption and
hash verifications



What are the seven aspects of integrity? - ANSWER Accuracy, truthfulness, validity, accountability,
responsibility, completeness and comprehensiveness



What is availability? - ANSWER Availability means authorised subjects are granted timely and
uninterrupted access to objects.



What are 6 threats to availability? - ANSWER Device failure, software errors, environmental issues, DOS
attacks, object destruction and communication interruptions

,What are 6 countermeasures that can ensure availability against possible threats? - ANSWER
Intermediary delivery systems, effective access controls, performance monitoring, firewalls/routers,
redundancy for critical systems and lastly, backups systems.



What are the three aspects of availability? - ANSWER Usability, Accessibility and Timeliness



What is the opposite of the CIA triad? - ANSWER The DAD Triad, Disclosure, Alteration and Destruction



When does disclosure occur? - ANSWER Disclosure occurs when sensitive or confidential material is
accessed by unauthorised entities



When does alteration occur? - ANSWER Alteration occurs when data is either maliciously or accidentally
changed.



When does destruction occur? - ANSWER Destruction occurs when a resource is damaged or made
inaccessible to authorised users.



Overprotecting confidentiality can result in a restriction of _______________ - ANSWER Availability



Overprotecting integrity can result in a restriction of __________ - ANSWER Availability



Over-providing availability can result in a loss of ___________ and ____________ - ANSWER
Confidentiality and Integrity



What is authenticity? - ANSWER Authenticity is the security concept that data is authentic or genuine
and originates from its alleged source.



What does non-repudiation ensure? - ANSWER Non-repudiation ensures that the subject of an activity
or who caused an event cannot deny that the event occurred.



What 5 concepts make non-repudiation possible? - ANSWER Identification, Authentication,
Authorisation, Accountability, and Auditing

, Non-repudiation is an essential part of ____________ - ANSWER Accountability



What does the 3 A's in AAA services mean - ANSWER Authentication, Authorisation and Accounting (or
Auditing)



What are the 5 elements of AAA services? - ANSWER Identification, Authentication, Authorisation,
auditing and accounting.



What is identification? - ANSWER Identification is claiming to be an identity when attempting to access a
secured area or system.



What is authentication? - ANSWER Authentication is proving that you are who you say you are



What is authorisation? - ANSWER Authorisation is defining the permissions of a resource and object
access for a specific identity or subject



What is auditing? - ANSWER Auditing is recording a log of the events and activities relayed to the system
and subjects.



What is accounting? - ANSWER Accounting is reviewing log files to check for compliance and violations in
order to held subjects accountable.



What is defence in depth? - ANSWER Defence in depth, AKA layering, is the use of multiple controls in a
series



What is abstraction? - ANSWER Abstraction is a process of hiding the implementation details and
showing only functionality to the user.



What is abstraction used for? - ANSWER Abstraction is used for efficiency. Similar elements are put into
groups that are assigned security controls/restrictions

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Performance Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
314
Member since
1 year
Number of followers
36
Documents
15133
Last sold
10 hours ago

Welcome To my Store My Goal is to help you achieve your desired grades by providing credible study materials I'm happy to help you with quality documents On this page you will find quality study guides, Exams assignments, Research papers and Test Banks all verified correct . you'll find past and recent revised and verified study materials . Stay here and You'll find everything you need to pass !!! . I always ensure my documents are of high standards Be assured to get good grades and always leave a review after a purchase Refer a friend SUCCESS!!!

Read more Read less
4.4

216 reviews

5
128
4
60
3
19
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions