100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CISSP DOMAIN 6 QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
17-08-2024
Written in
2024/2025

CISSP DOMAIN 6 QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Institution
CISSP
Course
CISSP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISSP
Course
CISSP

Document information

Uploaded on
August 17, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISSP DOMAIN 6 QUESTIONS AND
ANSWERS WITH SOLUTIONS 2024
Targeted Testing - ANSWER Most like a white-box software test.

The targeted testing method provides information to both the pen tester and the customer's security
personnel.

Also known as the lights-on approach.



Double-Blind Penetration Test - ANSWER Most like a black-box software test.

Also known as a zero-knowledge.

No information is provided to the tester or to the customer's security staff.



Blind Penetration Test - ANSWER The tester is provided with no information about the customer,
however, the customer's security staff will know that a vulnerability assessment that involves a
penetration test is underway.



Partial-Knowledge Penetration Test - ANSWER Most like a grey-box software test.

Pen testers are provided with a limited amount of information about the customer's environment, but
are not provided access to everything.



System Event logs - ANSWER Contain records that include information about objects on a file system.

Most likely to be audited to determine when a file was deleted.

Also typically record changes in user privileges and can provide evidence of unauthorized activity on a
system.



Network Event logs - ANSWER Records evidence of network attacks, like DoS attacks.

could record instances of traffic to a specific unauthorized service on a host within an organization, such
as a P2P file sharing network.

Most likely to be audited to determine whether unauthorized or inappropriate activity is occurring on
the network.



Application Event Logs - ANSWER Depends on the logging capabilities of the app.

, Most likely to be audited to determine whether a particular application has been attacked or
compromised.



User Activity Logs - ANSWER Record information that is similar to system events logs, but a user activity
log would most likely be used to audit who deleted a file, not when the file was deleted.

Most likely to be audited to determine the actions of a particular user.



Security Test - ANSWER Verify that a control is functioning properly.

They include automated scans, tool-assisted pen tests, and manual attempts to undermine security.

Takes place on a regular schedule



Security Assessments - ANSWER Comprehensive reviews of the security of a system, application, or
other tested environment.

Main work product of a security assessment is normally a report addressed to management that
contains the results of the assessment in business language.

During a security assessment, a trained information security professional performs a risk assessment
that identifies vulnerabilities in the tested environment that may allow a compromise and makes
recommendations for remediation, as needed.



Security Audits - ANSWER Evaluations performed with the purpose of demonstrating the effectiveness of
controls to a third party. Security audits use many of the same techniques followed during security
assessments but must be performed by independent auditors.



CVE (Common Vulnerabilities and Exposures) - ANSWER A dictionary of publicly known security
vulnerabilities and exposures.



CVSS (Common Vulnerability Scoring System) - ANSWER Provides a standardized scoring system for
describing the severity of security vulnerabilities.



CCE (Common Configuration Enumeration) - ANSWER Provides a naming system for system configuration
issues.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Performance Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
312
Member since
1 year
Number of followers
36
Documents
15127
Last sold
1 week ago

Welcome To my Store My Goal is to help you achieve your desired grades by providing credible study materials I'm happy to help you with quality documents On this page you will find quality study guides, Exams assignments, Research papers and Test Banks all verified correct . you'll find past and recent revised and verified study materials . Stay here and You'll find everything you need to pass !!! . I always ensure my documents are of high standards Be assured to get good grades and always leave a review after a purchase Refer a friend SUCCESS!!!

Read more Read less
4.4

216 reviews

5
128
4
60
3
19
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions