Jumat, 30 Januari 2015

CISSP Exam Preparation (Question 281)

(281) Most computer attacks result in violation of which of the following security properties?

A. Availability
B. Confidentiality
C. Integrity and control
D. All of the choices.

Correct Answer: D

Explanation/Reference:
Explanation:

Most computer attacks only corrupt a system's security in very specific ways. For example, certain attacks may enable a hacker to read specific files but don't allow alteration of any system components. Another attack may allow a hacker to shut down certain system components but doesn't allow access to any files. Despite the varied capabilities of computer attacks, they usually result in violation of only four different security properties: availability, confidentiality, integrity, and control.

- Idham Azhari

Jumat, 23 Januari 2015

CISSP Exam Preparation (Question 280)

(280) Which of the following describes elements that create reliability and stability in networks and systems and which assures that connectivity is accessible when needed?

A. Availability
B. Acceptability
C. Confidentiality
D. Integrity

Correct Answer: A


Explanation/Reference:

- Idham Azhari

Jumat, 16 Januari 2015

CISSP Exam Preparation (Question 279)

(279) Making sure that the data is accessible when and where it is needed is which of the following?

A. Confidentiality
B. integrity
C. acceptability
D. availability

Correct Answer: D


Explanation/Reference:

- Idham Azhari

Jumat, 09 Januari 2015

CISSP Exam Preparation (Question 278)

(278) Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality of transactions over networks may be maintained?

A. Communications security management and techniques
B. Networks security management and techniques
C. Clients security management and techniques
D. Servers security management and techniques

Correct Answer: A


Explanation/Reference:

- Idham Azhari

Jumat, 02 Januari 2015

CISSP Exam Preparation (Question 277)

(277) What are the three fundamental principles of security?

A. Accountability, confidentiality, and integrity
B. Confidentiality, integrity, and availability
C. Integrity, availability, and accountability
D. Availability, accountability, and confidentiality

Correct Answer: B


Explanation/Reference:

- Idham Azhari