100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP Chapter 1: Questions & Answers: Latest Updated A+ Guide

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
05-11-2023
Written in
2023/2024

Which of the following contains the primary goals and objectives of security? A. A network's border perimeter B. The CIA Triad C. A stand-alone system D. The Internet (Ans- B. The primary goals and objectives of security are confidentiality, integrity, and availability, commonly referred to as the CIA Triad . Vulnerabilities and risks are evaluated based on their threats against which of the following? A. One or more of the CIA Triad principles B. Data usefulness C. Due care D. Extent of liability (Ans- A. Vulnerabilities and risks are evaluated based on their threats against one or more of the CIA Triad principles. Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects? A. Identification B. Availability C. Encryption D. Layering (Ans- B. Availability means that authorized subjects are granted timely and uninterrupted access to objects. Which of the following is not considered a violation of confidentiality? A. Stealing passwords B. Eavesdropping C. Hardware destruction D. Social engineering (Ans- C. Hardware destruction is a violation of availability and possibly integrity. Violations of confidentiality include capturing network traffic, stealing password files, social engineering, port scanning, shoulder surfing, eavesdropping, and sniffing. Which of the following is not true? A. Violations of confidentiality include human error. B. Violations of confidentiality include management oversight. C. Violations of confidentiality are limited to direct intentional attacks. D. Violations of confidentiality can occur when a transmission is not properly encrypted. (Ans- C. Violations of confidentiality are not limited to direct intentional attacks. Many instances of unauthorized disclosure of sensitive or confidential information are due to human error, oversight, or ineptitude. STRIDE is often used in relation to assessing threats against applications or operating systems. Which of the following is not an element of STRIDE? A. Spoofing B. Elevation of privilege C. Repudiation D. Disclosure (Ans- D. Disclosure is not an element of STRIDE. The elements of STRIDE are spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege. If a security mechanism offers availability, then

Show more Read less
Institution
CISSP Domain
Course
CISSP Domain









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP Domain
Course
CISSP Domain

Document information

Uploaded on
November 5, 2023
Number of pages
14
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Joy100 Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
2608
Member since
4 year
Number of followers
2238
Documents
3107
Last sold
1 day ago
Expert Minds

Hello, my documents are 100% guaranteed to help you Ace in your studies, my goal is to empower and help you in your career, i represent more professional nursing specialties and other courses. I'm a friendly person, don't hesitate to contact me. Good luck

4.2

368 reviews

5
192
4
72
3
84
2
8
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions