Jumat, 27 Februari 2015

CISSP Exam Preparation (Question 285)

(285) Which one of the following is the MOST crucial link in the computer security chain?

A. Access controls
B. People
C. Management
D. Awareness programs

Correct Answer: C


Explanation/Reference:

- Idham Azhari

Jumat, 20 Februari 2015

CISSP Exam Preparation (Question 284)

(284) The Structures, transmission methods, transport formats, and security measures that are used to provide integrity, availability, and authentication, and confidentiality for transmissions over private and public communications networks and media includes:

A. The Telecommunications and Network Security domain
B. The Telecommunications and Netware Security domain
C. The Technical communications and Network Security domain
D. The Telnet and Security domain

Correct Answer: A

Explanation/Reference:

The Telecommunications, Network, and Internet Security Domain encompasses the structures, transmission methods, transport formats, and security measures used to provide integrity, availability, authentication, and confidentiality for transmissions over private and public communications networks and media." Pg 515 Hansche: Official (ISC)2 Guide to the CISSP Exam

- Idham Azhari

Jumat, 13 Februari 2015

CISSP Exam Preparation (Question 283)

(283) An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of Availability can be defined as:

A. Netware availability
B. Network availability
C. Network acceptability
D. Network accountability

Correct Answer: B


Explanation/Reference:

- Idham Azhari

Jumat, 06 Februari 2015

CISSP Exam Preparation (Question 282)

(282) Which of the following are objectives of an information systems security program?

A. Threats, vulnerabilities, and risks
B. Security, information value, and threats
C. Integrity, confidentiality, and availability.
D. Authenticity, vulnerabilities, and costs.

Correct Answer: C

Explanation/Reference:

There are several small and large objectives of a security program, but the main three principles in all programs are confidentiality, integrity, and availability. These are referred to as the CIA triad. - Shon Harris All-in-one CISSP Certification Guide pg 62

- Idham Azhari

Jumat, 30 Januari 2015

CISSP Exam Preparation (Question 281)

(281) Most computer attacks result in violation of which of the following security properties?

A. Availability
B. Confidentiality
C. Integrity and control
D. All of the choices.

Correct Answer: D

Explanation/Reference:
Explanation:

Most computer attacks only corrupt a system's security in very specific ways. For example, certain attacks may enable a hacker to read specific files but don't allow alteration of any system components. Another attack may allow a hacker to shut down certain system components but doesn't allow access to any files. Despite the varied capabilities of computer attacks, they usually result in violation of only four different security properties: availability, confidentiality, integrity, and control.

- Idham Azhari

Jumat, 23 Januari 2015

CISSP Exam Preparation (Question 280)

(280) Which of the following describes elements that create reliability and stability in networks and systems and which assures that connectivity is accessible when needed?

A. Availability
B. Acceptability
C. Confidentiality
D. Integrity

Correct Answer: A


Explanation/Reference:

- Idham Azhari

Jumat, 16 Januari 2015

CISSP Exam Preparation (Question 279)

(279) Making sure that the data is accessible when and where it is needed is which of the following?

A. Confidentiality
B. integrity
C. acceptability
D. availability

Correct Answer: D


Explanation/Reference:

- Idham Azhari