100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CISSP – Practice Questions And Correct Answers

Puntuación
-
Vendido
-
Páginas
35
Grado
A+
Subido en
02-12-2024
Escrito en
2024/2025

©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 1 | P a g e CISSP – Practice Questions And Correct Answers Data Remanence - answerThe remains of partial or even the entire data set of digital information Disaster Recovery Planning (DRP) - answerDeals with restoring normal business operations after the disaster takes place...works to get the business back to normal Maximum tolerable downtime - answerThe maximum period of time that a critical business function can be inoperative before the company incurs significant and long-lasting damage. 802.5 - answerIEEE standard defines the Token Ring media access method Recovery Time Objective - answerThe balance against the cost of recover and the cost of disruption Resource Requirements - answerportion of the BIA that lists the resources that an organization needs in order to continue operating each critical business function. Checklist - answerTest is one in which copies of the plan are handed out to each functional area to ensure the plan deal with their needs Information Owner - answerThe one person responsible for data, its classification and control setting Job Rotation - answerTo move from location to location, keeping the same function Differential power analysis - answerA side-channel attack carry-out on smart cards that examining the power emission release during processing Mitigate - answerDefined as real-time monitoring and analysis of network activity and data for potential vulnerabilities and attacks in progress. ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 2 | P a g e Electromagnetic analysis - answerA side-channel attack on smart cards that examine the frequencies emitted and timing Analysis - answerSystematic assessment of threats and vulnerabilities that provides a basis for effective management of risk. Change Control - answerMaintaining full control over requests, implementation, traceability, and proper documentation of changes. Containment - answerMitigate damage by isolating compromised systems from the network. 30 to 90 Days - answerMost organizations enforce policies to change password ranging from Isochronous - answerProcess must within set time constrains, applications are video related where audio and video must match perfectly Detection - answerIdentification and notification of an unauthorized and/or undesired action Electronic Vaulting - answerPeriodic, automatic and transparent backup of data in bulk. Fault Tolerance - answerMitigation of system or component loss or interruption through use of backup capability. Incremental - answerA backup method use when time and space are a high importance Secure HTTP - answerProtocol designed to same individual message securely Criminal - answerConduct that violates government laws developed to protect society Class C - answerHas 256 hosts RAID 0 - answerCreates one large disk by using several disks Trade secrets - answerDeemed proprietary to a company and often include information that provides a competitive edge, the information is protected as long the owner takes protective actions X.400 - answerActive Directory standard Prevention - answerControls deployed to avert unauthorized and/or undesired actions. Redundant Array Of Independent Drives (RAID) - answerA group of hard drives working as one storage unit for the purpose of speed and fault tolerance Proprietary - answerDefine the way in which the organization operates. ©BRAINBARTER EXAM SOLUTIONS 2024/2025 ALL RIGHTS RESERVED. 3 | P a g e Gateway - answerUsed to connect two networks using dissimilar protocols at different layers of the OSI model Classification - answerThe assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification. Data Integrity - answerThe property that data meet with a priority expectation of quality and that the data can be relied upon. Alarm Filtering - answerThe process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks Coaxial Cable - answerA cable consisting of a core, inner conductor that is surrounding by an insulator, an outer cylindrical conductor Concentrator - answerLayer 1 network device that is used to connect network segments together, but provides no traffic control (a hub). Digital Signature - answerAn asymmetric cryptography mechanism that provides authentication. Eavesdropping - answerA passive network attack involving monitoring of traffic. E-Mail Spoofing - answerForgery of the sender's email address in an email header. Emanations - answerPotentially compromising leakage of electrical or acoustical signals. Fiber Optics - answerBundles of long strands of pure glass that efficiently transmit light pulses over long distances. Interception without detection is difficult. Fraggle - answerA Denial of Service attack initiated by sending spoofed UDP echo request to IP broadcast addresses. Hijacking - answerInterception of a communication session by an attacker. Hub - answerLayer 1 network device that is used to connect network segments together, but provides no traffic control (a concentrator). Injection - answerAn attack technique that exploits systems that do not perform input validation by embedding partial SQL queries inside input. Interception - answerUnauthorized access of information (e.g. Tapping, sniffing, unsecured wireless communication, emanations) IP Address Spoofing - answerForging of an IP address.

Mostrar más Leer menos
Institución
CISSP
Grado
CISSP











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CISSP
Grado
CISSP

Información del documento

Subido en
2 de diciembre de 2024
Número de páginas
35
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.



CISSP – Practice Questions And Correct
Answers


Data Remanence - answer✔The remains of partial or even the entire data set of digital
information

Disaster Recovery Planning (DRP) - answer✔Deals with restoring normal business operations
after the disaster takes place...works to get the business back to normal

Maximum tolerable downtime - answer✔The maximum period of time that a critical business
function can be inoperative before the company incurs significant and long-lasting damage.

802.5 - answer✔IEEE standard defines the Token Ring media access method

Recovery Time Objective - answer✔The balance against the cost of recover and the cost of
disruption

Resource Requirements - answer✔portion of the BIA that lists the resources that an
organization needs in order to continue operating each critical business function.

Checklist - answer✔Test is one in which copies of the plan are handed out to each functional
area to ensure the plan deal with their needs

Information Owner - answer✔The one person responsible for data, its classification and control
setting

Job Rotation - answer✔To move from location to location, keeping the same function

Differential power analysis - answer✔A side-channel attack carry-out on smart cards that
examining the power emission release during processing

Mitigate - answer✔Defined as real-time monitoring and analysis of network activity and data
for potential vulnerabilities and attacks in
progress.



1|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
Electromagnetic analysis - answer✔A side-channel attack on smart cards that examine the
frequencies emitted and timing

Analysis - answer✔Systematic assessment of threats and vulnerabilities that provides a basis for
effective management of risk.

Change Control - answer✔Maintaining full control over requests, implementation, traceability,
and proper documentation of changes.

Containment - answer✔Mitigate damage by isolating compromised systems from the network.

30 to 90 Days - answer✔Most organizations enforce policies to change password ranging from

Isochronous - answer✔Process must within set time constrains, applications are video related
where audio and video must match perfectly

Detection - answer✔Identification and notification of an unauthorized and/or undesired action

Electronic Vaulting - answer✔Periodic, automatic and transparent backup of data in bulk.

Fault Tolerance - answer✔Mitigation of system or component loss or interruption through use
of backup capability.

Incremental - answer✔A backup method use when time and space are a high importance

Secure HTTP - answer✔Protocol designed to same individual message securely

Criminal - answer✔Conduct that violates government laws developed to protect society

Class C - answer✔Has 256 hosts

RAID 0 - answer✔Creates one large disk by using several disks

Trade secrets - answer✔Deemed proprietary to a company and often include information that
provides a competitive edge, the information is protected as long the owner takes protective
actions

X.400 - answer✔Active Directory standard

Prevention - answer✔Controls deployed to avert unauthorized and/or undesired actions.

Redundant Array Of Independent Drives (RAID) - answer✔A group of hard drives working as
one storage unit for the purpose of speed and fault tolerance

Proprietary - answer✔Define the way in which the organization operates.



2|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
Gateway - answer✔Used to connect two networks using dissimilar protocols at different layers
of the OSI model

Classification - answer✔The assignment of a level of sensitivity to data (or information) that
results in the specification of controls for each level of classification.

Data Integrity - answer✔The property that data meet with a priority expectation of quality and
that the data can be relied upon.

Alarm Filtering - answer✔The process of categorizing attack alerts produced from an IDS in
order to distinguish false positives from actual attacks

Coaxial Cable - answer✔A cable consisting of a core, inner conductor that is surrounding by an
insulator, an outer cylindrical conductor

Concentrator - answer✔Layer 1 network device that is used to connect network segments
together, but provides no traffic control (a hub).

Digital Signature - answer✔An asymmetric cryptography mechanism that provides
authentication.

Eavesdropping - answer✔A passive network attack involving monitoring of traffic.

E-Mail Spoofing - answer✔Forgery of the sender's email address in an email header.

Emanations - answer✔Potentially compromising leakage of electrical or acoustical signals.

Fiber Optics - answer✔Bundles of long strands of pure glass that efficiently transmit light pulses
over long distances. Interception without detection is difficult.

Fraggle - answer✔A Denial of Service attack initiated by sending spoofed UDP echo request to
IP broadcast addresses.

Hijacking - answer✔Interception of a communication session by an attacker.

Hub - answer✔Layer 1 network device that is used to connect network segments together, but
provides no traffic control (a concentrator).

Injection - answer✔An attack technique that exploits systems that do not perform input
validation by embedding partial SQL queries inside input.

Interception - answer✔Unauthorized access of information (e.g. Tapping, sniffing, unsecured
wireless communication, emanations)

IP Address Spoofing - answer✔Forging of an IP address.


3|Page

, ©BRAINBARTER EXAM SOLUTIONS 2024/2025

ALL RIGHTS RESERVED.
IP Fragmentation - answer✔An attack that breaks up malicious code into fragments, in an
attempt to elude detection.

Kerberos - answer✔A trusted third party authentication protocol

Incident response - answer✔Team should consist of: management, IT, legal, human resources,
public relations, security etc.

Modification - answer✔A type of attack involving attempted insertion, deletion or altering of
data.

Multiplexers - answer✔A device that sequentially switches multiple analog inputs to the
output.

Open Mail Relay Servers - answer✔A mail server that improperly allows inbound SMTP
connections for domains it does not serve.

Enticement - answer✔The legal act of luring an intruder, with intend to monitor their behavior

Packet Filtering - answer✔A basic level of network access control that is based upon
information contained in the IP packet header.

Patch Panels - answer✔Provides a physical cross connect point for devices.

Private Branch Exchange (PBX) - answer✔A telephone exchange for a specific office or business.

Phishing - answer✔A social engineering attack that uses spoofed email or websites to persuade
people to divulge information.

Physical Tampering - answer✔Unauthorized access of network devices.

Proxies - answer✔Mediates communication between un-trusted hosts on behalf of the hosts
that it protects.

Repeaters - answer✔Layer 1 network device that is used to connect network segments
together, but provides no traffic control (a concentrator).

Radio Frequency Interference (RFI) - answer✔A disturbance that degrades performance of
electronic devices and electronic communications.

Rogue Access Points - answer✔Unauthorized wireless network access device.

Routers - answer✔A layer 3 device that used to connect two or more network segments and
regulate traffic.



4|Page
$12.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Brainbarter Kaplan University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
325
Miembro desde
2 año
Número de seguidores
153
Documentos
22254
Última venta
1 semana hace
A+ STUDY MATERIALS.

We offer a wide range of high-quality study materials, including study guides practice exams and flashcards. WELCOME.

3.5

54 reseñas

5
21
4
8
3
12
2
4
1
9

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes