Jumat, 23 Januari 2015

CISSP Exam Preparation (Question 280)

(280) Which of the following describes elements that create reliability and stability in networks and systems and which assures that connectivity is accessible when needed?

A. Availability
B. Acceptability
C. Confidentiality
D. Integrity

Correct Answer: A


Explanation/Reference:

- Idham Azhari

Jumat, 16 Januari 2015

CISSP Exam Preparation (Question 279)

(279) Making sure that the data is accessible when and where it is needed is which of the following?

A. Confidentiality
B. integrity
C. acceptability
D. availability

Correct Answer: D


Explanation/Reference:

- Idham Azhari

Jumat, 09 Januari 2015

CISSP Exam Preparation (Question 278)

(278) Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality of transactions over networks may be maintained?

A. Communications security management and techniques
B. Networks security management and techniques
C. Clients security management and techniques
D. Servers security management and techniques

Correct Answer: A


Explanation/Reference:

- Idham Azhari

Jumat, 02 Januari 2015

CISSP Exam Preparation (Question 277)

(277) What are the three fundamental principles of security?

A. Accountability, confidentiality, and integrity
B. Confidentiality, integrity, and availability
C. Integrity, availability, and accountability
D. Availability, accountability, and confidentiality

Correct Answer: B


Explanation/Reference:

- Idham Azhari

Jumat, 26 Desember 2014

C I S S P D O M A I N S

C I S S P    D O M A I N S

  1. Access Control - a collection of mechanisms that work together to create security architecture to protect the assets of the information system.
  2. Telecommunication and Network Security - discusses network structures, transmission methods, transport formats and security measures used to provide availability, integrity and confidentiality.
  3. Information Security Governance and Risk Management - the identification of an organisation's information assets and the development, documentation and implementation of policies, standards, procedures and guidelines.
  4. Software Development Security -  refers to the controls that are included within systems and applications software and the steps used in their development.
  5. Cryptography - the principles, means and methods of disguising information to ensure its integrity, confidentiality and authenticity.
  6. Security Architecture and Design - contains the concepts, principles, structures and standards used to design, implement, monitor, and secure, operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity and availability.
  7. Operations Security - used to identify the controls over hardware, media and the operators with access priviliges to any of these resources.
  8. Business Continuity and Disaster Recovery Planning - addresses the preservation of the business in the face of major disruptions to normal business operations.
  9. Legal, Regulations, Investogations and Compliance - addresses computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed and methods to gather evidence.
  10. Physical (Environmental) Security - addresses the threats, vulnerabilities and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information.
- Idham Azhari

CISSP Exam Preparation (Question 276)

(276) Security is a process that is:

A. Continuous
B. Indicative
C. Examined
D. Abnormal

Correct Answer: A

Explanation/Reference:
Explanation:

Security is a continuous process; as such you must closely monitor your systems on a regular basis. Log files are usually a good way to find an indication of abnormal activities. However some care must be exercise as to what will be logged and how the logs are protected. Having corrupted logs is about as good as not having logs at all.

- Idham Azhari

Jumat, 19 Desember 2014

CISSP Exam Preparation (Question 275)

(275) Network Security is a

A. Product
B. protocols
C. ever evolving process
D. quick-fix solution

Correct Answer: C


Explanation/Reference:

- Idham Azhari