100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP – Practice Questions And Correct Answers

Rating
-
Sold
-
Pages
35
Grade
A+
Uploaded on
02-12-2024
Written in
2024/2025

©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 1 | P a g e CISSP – Practice Questions And Correct Answers Data Remanence - answerThe remains of partial or even the entire data set of digital information Disaster Recovery Planning (DRP) - answerDeals with restoring normal business operations after the disaster takes place...works to get the business back to normal Maximum tolerable downtime - answerThe maximum period of time that a critical business function can be inoperative before the company incurs significant and long-lasting damage. 802.5 - answerIEEE standard defines the Token Ring media access method Recovery Time Objective - answerThe balance against the cost of recover and the cost of disruption Resource Requirements - answerportion of the BIA that lists the resources that an organization needs in order to continue operating each critical business function. Checklist - answerTest is one in which copies of the plan are handed out to each functional area to ensure the plan deal with their needs Information Owner - answerThe one person responsible for data, its classification and control setting Job Rotation - answerTo move from location to location, keeping the same function Differential power analysis - answerA side-channel attack carry-out on smart cards that examining the power emission release during processing Mitigate - answerDefined as real-time monitoring and analysis of network activity and data for potential vulnerabilities and attacks in progress. ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 2 | P a g e Electromagnetic analysis - answerA side-channel attack on smart cards that examine the frequencies emitted and timing Analysis - answerSystematic assessment of threats and vulnerabilities that provides a basis for effective management of risk. Change Control - answerMaintaining full control over requests, implementation, traceability, and proper documentation of changes. Containment - answerMitigate damage by isolating compromised systems from the network. 30 to 90 Days - answerMost organizations enforce policies to change password ranging from Isochronous - answerProcess must within set time constrains, applications are video related where audio and video must match perfectly Detection - answerIdentification and notification of an unauthorized and/or undesired action Electronic Vaulting - answerPeriodic, automatic and transparent backup of data in bulk. Fault Tolerance - answerMitigation of system or component loss or interruption through use of backup capability. Incremental - answerA backup method use when time and space are a high importance Secure HTTP - answerProtocol designed to same individual message securely Criminal - answerConduct that violates government laws developed to protect society Class C - answerHas 256 hosts RAID 0 - answerCreates one large disk by using several disks Trade secrets - answerDeemed proprietary to a company and often include information that provides a competitive edge, the information is protected as long the owner takes protective actions X.400 - answerActive Directory standard Prevention - answerControls deployed to avert unauthorized and/or undesired actions. Redundant Array Of Independent Drives (RAID) - answerA group of hard drives working as one storage unit for the purpose of speed and fault tolerance Proprietary - answerDefine the way in which the organization operates. ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 3 | P a g e Gateway - answerUsed to connect two networks using dissimilar protocols at different layers of the OSI model Classification - answerThe assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification. Data Integrity - answerThe property that data meet with a priority expectation of quality and that the data can be relied upon. Alarm Filtering - answerThe process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks Coaxial Cable - answerA cable consisting of a core, inner conductor that is surrounding by an insulator, an outer cylindrical conductor Concentrator - answerLayer 1 network device that is used to connect network segments together, but provides no traffic control (a hub). Digital Signature - answerAn asymmetric cryptography mechanism that provides authentication. Eavesdropping - answerA passive network attack involving monitoring of traffic. E-Mail Spoofing - answerForgery of the sender's email address in an email header. Emanations - answerPotentially compromising leakage of electrical or acoustical signals. Fiber Optics - answerBundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult. Fraggle - answerA Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. Hijacking - answerInterception of a communication session by an attacker. Hub - answerLayer 1 network device that is used to connect network segments together, but provides no traffic control (a concentrator). Injection - answerAn attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input. Interception - answerUnauthorized access of information (e.g. Tapping, sniffing, unsecured wireless communication, emanations) IP Address Spoofing - answerForging of an IP address.

Show more Read less
Institution
CISSP
Course
CISSP











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP
Course
CISSP

Document information

Uploaded on
December 2, 2024
Number of pages
35
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.



CISSP – Practice Questions And Correct
Answers


Data Remanence - answer✔The remains of partial or even the entire data set of digital
information

Disaster Recovery Planning (DRP) - answer✔Deals with restoring normal business operations
after the disaster takes place...works to get the business back to normal

Maximum tolerable downtime - answer✔The maximum period of time that a critical business
function can be inoperative before the company incurs significant and long-lasting damage.

802.5 - answer✔IEEE standard defines the Token Ring media access method

Recovery Time Objective - answer✔The balance against the cost of recover and the cost of
disruption

Resource Requirements - answer✔portion of the BIA that lists the resources that an
organization needs in order to continue operating each critical business function.

Checklist - answer✔Test is one in which copies of the plan are handed out to each functional
area to ensure the plan deal with their needs

Information Owner - answer✔The one person responsible for data, its classification and control
setting

Job Rotation - answer✔To move from location to location, keeping the same function

Differential power analysis - answer✔A side-channel attack carry-out on smart cards that
examining the power emission release during processing

Mitigate - answer✔Defined as real-time monitoring and analysis of network activity and data
for potential vulnerabilities and attacks in
progress.



1|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
Electromagnetic analysis - answer✔A side-channel attack on smart cards that examine the
frequencies emitted and timing

Analysis - answer✔Systematic assessment of threats and vulnerabilities that provides a basis for
effective management of risk.

Change Control - answer✔Maintaining full control over requests, implementation, traceability,
and proper documentation of changes.

Containment - answer✔Mitigate damage by isolating compromised systems from the network.

30 to 90 Days - answer✔Most organizations enforce policies to change password ranging from

Isochronous - answer✔Process must within set time constrains, applications are video related
where audio and video must match perfectly

Detection - answer✔Identification and notification of an unauthorized and/or undesired action

Electronic Vaulting - answer✔Periodic, automatic and transparent backup of data in bulk.

Fault Tolerance - answer✔Mitigation of system or component loss or interruption through use
of backup capability.

Incremental - answer✔A backup method use when time and space are a high importance

Secure HTTP - answer✔Protocol designed to same individual message securely

Criminal - answer✔Conduct that violates government laws developed to protect society

Class C - answer✔Has 256 hosts

RAID 0 - answer✔Creates one large disk by using several disks

Trade secrets - answer✔Deemed proprietary to a company and often include information that
provides a competitive edge, the information is protected as long the owner takes protective
actions

X.400 - answer✔Active Directory standard

Prevention - answer✔Controls deployed to avert unauthorized and/or undesired actions.

Redundant Array Of Independent Drives (RAID) - answer✔A group of hard drives working as
one storage unit for the purpose of speed and fault tolerance

Proprietary - answer✔Define the way in which the organization operates.



2|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
Gateway - answer✔Used to connect two networks using dissimilar protocols at different layers
of the OSI model

Classification - answer✔The assignment of a level of sensitivity to data (or information) that
results in the specification of controls for each level of classification.

Data Integrity - answer✔The property that data meet with a priority expectation of quality and
that the data can be relied upon.

Alarm Filtering - answer✔The process of categorizing attack alerts produced from an IDS in
order to distinguish false positives from actual attacks

Coaxial Cable - answer✔A cable consisting of a core, inner conductor that is surrounding by an
insulator, an outer cylindrical conductor

Concentrator - answer✔Layer 1 network device that is used to connect network segments
together, but provides no traffic control (a hub).

Digital Signature - answer✔An asymmetric cryptography mechanism that provides
authentication.

Eavesdropping - answer✔A passive network attack involving monitoring of traffic.

E-Mail Spoofing - answer✔Forgery of the sender's email address in an email header.

Emanations - answer✔Potentially compromising leakage of electrical or acoustical signals.

Fiber Optics - answer✔Bundles of long strands of pure glass that efficiently transmit light pulses
over long distances. Interception without detection is difficult.

Fraggle - answer✔A Denial of Service attack initiated by sending spoofed UDP echo request to
IP broadcast addresses.

Hijacking - answer✔Interception of a communication session by an attacker.

Hub - answer✔Layer 1 network device that is used to connect network segments together, but
provides no traffic control (a concentrator).

Injection - answer✔An attack technique that exploits systems that do not perform input
validation by embedding partial SQL queries inside input.

Interception - answer✔Unauthorized access of information (e.g. Tapping, sniffing, unsecured
wireless communication, emanations)

IP Address Spoofing - answer✔Forging of an IP address.


3|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
IP Fragmentation - answer✔An attack that breaks up malicious code into fragments, in an
attempt to elude detection.

Kerberos - answer✔A trusted third party authentication protocol

Incident response - answer✔Team should consist of: management, IT, legal, human resources,
public relations, security etc.

Modification - answer✔A type of attack involving attempted insertion, deletion or altering of
data.

Multiplexers - answer✔A device that sequentially switches multiple analog inputs to the
output.

Open Mail Relay Servers - answer✔A mail server that improperly allows inbound SMTP
connections for domains it does not serve.

Enticement - answer✔The legal act of luring an intruder, with intend to monitor their behavior

Packet Filtering - answer✔A basic level of network access control that is based upon
information contained in the IP packet header.

Patch Panels - answer✔Provides a physical cross connect point for devices.

Private Branch Exchange (PBX) - answer✔A telephone exchange for a specific office or business.

Phishing - answer✔A social engineering attack that uses spoofed email or websites to persuade
people to divulge information.

Physical Tampering - answer✔Unauthorized access of network devices.

Proxies - answer✔Mediates communication between un-trusted hosts on behalf of the hosts
that it protects.

Repeaters - answer✔Layer 1 network device that is used to connect network segments
together, but provides no traffic control (a concentrator).

Radio Frequency Interference (RFI) - answer✔A disturbance that degrades performance of
electronic devices and electronic communications.

Rogue Access Points - answer✔Unauthorized wireless network access device.

Routers - answer✔A layer 3 device that used to connect two or more network segments and
regulate traffic.



4|Page

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Brainbarter Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
325
Member since
2 year
Number of followers
153
Documents
22254
Last sold
1 week ago
A+ STUDY MATERIALS.

We offer a wide range of high-quality study materials, including study guides practice exams and flashcards. WELCOME.

3.5

54 reviews

5
21
4
8
3
12
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions