100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CISSP Exam Questions And Correct Answers

Puntuación
-
Vendido
-
Páginas
25
Grado
A+
Subido en
02-12-2024
Escrito en
2024/2025

©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 1 | P a g e CISSP Exam Questions And Correct Answers CIA Triangle - answerCornerstone of infosec. Confidentiality, Integrity, Availability Confidentiality (CIA Triangle) - answerprevention of unauthorized disclosure of information; prevention of unauthorized read access to data Integrity (CIA Triangle) - answerprevention of unauthorized modification of data; prevention of unauthorized write access to data Availability (CIA Triangle) - answerensures data is available when needed to authorized users Opposing forces to CIA - answerDAD: disclosure, alteration, destruction identification - answerthe process by which a subject professes an identity and accountability is initiated; ex: typing a username, swiping a smart card, waving a proximity device (badging in), speaking a phrase, etc - always a two step process with authenticating authentication - answerverification that a person is who they say they are; ex: entering a password or PIN, biometrics, etc - always a two step process with identifying authorization - answerverification of a person's access or privileges to applicable data auditing (monitoring) - answerrecording a log of the events and activities related to the system and subjects accounting (accountability) - answerreviewing log files to check for compliance and violations in order to hold subjects accountable for their actions non-repudiation - answera user cannot deny having performed a specific action subject - answeran entity that performs active functions to a system; usually a person, but can also be script or program designed to perform actions on data object - answerany passive data within the system ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 2 | P a g e ISC2 Code of Ethics Canons (4) - answer1. protect society, commonwealth, infrastructure 2. act honorably, justly, responsibly, legally 3. provide diligent and competent service 4. advance and protect the profession strictly applied in order; exam questions in which multiple canons could be the answer, choose the highest priority per this order policy - answermandatory high level management directives; components of policy 1. purpose: describes the need for policy 2. scope: what systems, people, facilities, organizations are covered 3. responsibilities: specific duties of involved parties 4. compliance: effectiveness of policy, violations of policy procedure - answerlow level step by step guide for accomplishing a task standard - answerdescribes the specific use of technology applied to hardware or software; mandatory guideline - answerdiscretionary recommendations (e.g. not mandatory) baseline - answera uniform way of implementing a standard 3 access/security control categories - answer1. administrative: implemented by creating org policy, procedure, regulation. user awareness/training also fall here 2. technical: implemented using hardware, software, firmware that restricts logical access to a system 3. physical: locks, fences, walls, etc preventive access control (can be administrative, technical, physical) - answerprevents actions from occurring by applying restrictions on what a user can do. example: privilege level detective access control ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 3 | P a g e (can be administrative, technical, physical) - answercontrols that alert during or after a successful attack; alarm systems, or closed circuit tv corrective access control (can be administrative, technical, physical) - answerrepairing a damaged system; often works hand in hand with detective controls (e.g. antivirus software) recovery access control (can be administrative, technical, physical) - answercontrols to restore a system after an incident has occurred; deterrent access control (can be administrative, technical, physical) - answerdeters users from performing actions on a system compensating access control (can be administrative, technical, physical) - answeradditional control used to compensate for weaknesses in other controls as needed risk formula - answerrisk = threat x vulnerability x impact market approach (for calculating intangible assets) - answerassumes the fair value of an asset reflects the price which comparable assets have been purchased in transactions under similar circumstances income approach (for calculating intangible assets) - answerthe value of an asset is the present value of the future earning capacity that an asset will generate over the rest of its lifecycle cost approach (for calculating intangible assets) - answerestimates the fair value based on cost of replacement exposure factor (EF) - answerpercentage of value the asset lost due to incident single loss expectancy (SLE) - answerasset value (AV) times exposure factor AV x EF = SLE expressed in a dollar value annual rate of occurrence (ARO) - answernumber of losses suffered per year annualized loss expectancy (ALE) - answeryearly cost due to risk

Mostrar más Leer menos
Institución
CISSP
Grado
CISSP










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CISSP
Grado
CISSP

Información del documento

Subido en
2 de diciembre de 2024
Número de páginas
25
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.




CISSP Exam Questions And Correct
Answers

CIA Triangle - answer✔Cornerstone of infosec. Confidentiality, Integrity, Availability

Confidentiality (CIA Triangle) - answer✔prevention of unauthorized disclosure of information;
prevention of unauthorized read access to data

Integrity (CIA Triangle) - answer✔prevention of unauthorized modification of data; prevention
of unauthorized write access to data

Availability (CIA Triangle) - answer✔ensures data is available when needed to authorized users

Opposing forces to CIA - answer✔DAD: disclosure, alteration, destruction

identification - answer✔the process by which a subject professes an identity and accountability
is initiated; ex: typing a username, swiping a smart card, waving a proximity device (badging in),
speaking a phrase, etc - always a two step process with authenticating

authentication - answer✔verification that a person is who they say they are; ex: entering a
password or PIN, biometrics, etc - always a two step process with identifying

authorization - answer✔verification of a person's access or privileges to applicable data

auditing (monitoring) - answer✔recording a log of the events and activities related to the
system and subjects

accounting (accountability) - answer✔reviewing log files to check for compliance and violations
in order to hold subjects accountable for their actions

non-repudiation - answer✔a user cannot deny having performed a specific action

subject - answer✔an entity that performs active functions to a system; usually a person, but
can also be script or program designed to perform actions on data

object - answer✔any passive data within the system


1|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
ISC2 Code of Ethics Canons (4) - answer✔1. protect society, commonwealth, infrastructure
2. act honorably, justly, responsibly, legally
3. provide diligent and competent service
4. advance and protect the profession


strictly applied in order; exam questions in which multiple canons could be the answer, choose
the highest priority per this order

policy - answer✔mandatory high level management directives; components of policy


1. purpose: describes the need for policy
2. scope: what systems, people, facilities, organizations are covered
3. responsibilities: specific duties of involved parties
4. compliance: effectiveness of policy, violations of policy

procedure - answer✔low level step by step guide for accomplishing a task

standard - answer✔describes the specific use of technology applied to hardware or software;
mandatory

guideline - answer✔discretionary recommendations (e.g. not mandatory)

baseline - answer✔a uniform way of implementing a standard

3 access/security control categories - answer✔1. administrative: implemented by creating org
policy, procedure, regulation. user awareness/training also fall here
2. technical: implemented using hardware, software, firmware that restricts logical access to a
system
3. physical: locks, fences, walls, etc
preventive access control

(can be administrative, technical, physical) - answer✔prevents actions from occurring by
applying restrictions on what a user can do. example: privilege level
detective access control


2|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
(can be administrative, technical, physical) - answer✔controls that alert during or after a
successful attack; alarm systems, or closed circuit tv
corrective access control

(can be administrative, technical, physical) - answer✔repairing a damaged system; often works
hand in hand with detective controls (e.g. antivirus software)
recovery access control

(can be administrative, technical, physical) - answer✔controls to restore a system after an
incident has occurred;
deterrent access control

(can be administrative, technical, physical) - answer✔deters users from performing actions on a
system
compensating access control

(can be administrative, technical, physical) - answer✔additional control used to compensate for
weaknesses in other controls as needed

risk formula - answer✔risk = threat x vulnerability x impact

market approach (for calculating intangible assets) - answer✔assumes the fair value of an asset
reflects the price which comparable assets have been purchased in transactions under similar
circumstances

income approach (for calculating intangible assets) - answer✔the value of an asset is the
present value of the future earning capacity that an asset will generate over the rest of its
lifecycle

cost approach (for calculating intangible assets) - answer✔estimates the fair value based on
cost of replacement

exposure factor (EF) - answer✔percentage of value the asset lost due to incident

single loss expectancy (SLE) - answer✔asset value (AV) times exposure factor
AV x EF = SLE
expressed in a dollar value

annual rate of occurrence (ARO) - answer✔number of losses suffered per year

annualized loss expectancy (ALE) - answer✔yearly cost due to risk

3|Page
$11.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Thumbnail
Package deal
CISSP Exam Package Deal.
-
7 2024
$ 88.43 Más información

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Brainbarter Kaplan University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
325
Miembro desde
2 año
Número de seguidores
153
Documentos
22254
Última venta
1 semana hace
A+ STUDY MATERIALS.

We offer a wide range of high-quality study materials, including study guides practice exams and flashcards. WELCOME.

3.5

54 reseñas

5
21
4
8
3
12
2
4
1
9

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes