100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISSP - Practice Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution $7.99   Add to cart

Exam (elaborations)

CISSP - Practice Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

 1 view  0 purchase
  • Course
  • Institution

CISSP - Practice Questions with 100% Actual correct answers | verified | latest update | Graded A+ | Already Passed | Complete Solution

Preview 4 out of 34  pages

  • June 19, 2024
  • 34
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CISSP - Practice
• Project initiation
• Functional design analysis & planning
• Security requirements developed
• System design specifications
• Software developments
• Installation
• Maintenance support
• Revision and replacement - correct answer-System Development Life Cycle phase

0-1023 - correct answer-Well Known ports

1000 Volts - correct answer-Static charge damage Scramble Monitor Display

1024-49151 - correct answer-Registered ports as defined by IANA

1029 - correct answer-18 USC - Fraud and Related Activity in Connection with Access
Devices

1030 - correct answer-18 USC - Fraud and Related Activity in Connection with Computers

14443-1 - correct answer-ISO/IEC standard for smart card physical characteristics

14443-3 - correct answer-ISO/IEC standard for smart cards initialization and anticollision

14443-4 - correct answer-ISO/IEC standard for smart cards - Transmission protocol

1500 Volts - correct answer-Static charge damage Disk Drive, causing data loss

17000 Volts - correct answer-Static charge damage Permanent Chip

1994 U.S Communication Assistance for Law enforcement Act - correct answer-Requires all
communications carriers to make wiretaps possible

2 - correct answer-EAL Structurally tested

2-Phase Commit - correct answer-A distributed system's transaction control that requires
updates to complete or rollback

2000 Volts - correct answer-Static charge damage System Shutdown

3 - correct answer-EAL Methodically tested and checked

30 to 90 Days - correct answer-Most organizations enforce policies to change password
ranging from

,3DES - correct answer-Uses 48 rounds of computation and up to three different keys

4 - correct answer-EAL Methodically designed, tested, and reviewed

40 Volts - correct answer-Static charge damage Sensitive Circuits and Transistors

4000 Volts - correct answer-Static charge damage Printer Jam

49152-65535 - correct answer-Dynamic and/or private ports

5 - correct answer-EAL Semiformally designed and tested

5 Rules Of Evidence - correct answer-Evidence must be: admissible, authentic, complete,
accurate, and convincing

6 - correct answer-Semiformally verified design and tested

636 - correct answer-Many implementations run LDAP on SSL on this port

802.5 - correct answer-IEEE standard defines the Token Ring media access method

Access - correct answer-A flow of information between a subject and an object

Access Control - correct answer-The process of allowing only authorized users, programs, or
other computer systems, to observe, modify, or otherwise take possession of the resources
of a computer system. It also limit authorized users to some resources.

Access Control Process - correct answer-1- Defining resources
2- Determining users
3- Specifying how users use recourse

Accidental threats - correct answer-More than 3-4 of all security violations are linked to
insiders of a company are

Accreditation - correct answer-The managerial approval to operate a system based upon
knowledge of risk to operate

Accurate - correct answer-Pertaining to law, high degree of veracity

Acronym for American Standard Code for Information Interchange (ASCII) - correct
answer-Text that does not include special formatting features and therefore can be
exchanged and read by most computer systems

Activation - correct answer-To start business continuity processes

,Active Data - correct answer-Information residing on computer systems, that is readily visible
to the operating system with which it was created and is immediately accessible to users
without deletion, modification or reconstruction.

Administrative - correct answer-Covers standards of performance or conduct expected by
government agencies from companies, industries, certain officials

Administrative Control - correct answer-These include the developing and publishing of
policies, standards, procedures, guidelines, risk management, and security awareness
training

ADSL - correct answer-Delivers a max of 9 Mpbs downstream

Adware - correct answer-Unsolicited advertising software

Alarm Filtering - correct answer-The process of categorizing attack alerts produced from an
IDS in order to distinguish false positives from actual attacks

ALE - correct answer-ARO X SLE

ALE - correct answer-ARO X SLE

ALE - correct answer-SLE x ARO =

Algorithm - correct answer-Mathematical function that determines the cryptographic
operations

Algorithms - correct answer-The mathematical rules that dictate the functions of enciphering
and deciphering

Alternate Data Streams (File System Forks) - correct answer-A covert storage channel on
the file attribute

Alternate Site - correct answer-Location to perform the business function

Analysis - correct answer-Systematic assessment of threats and vulnerabilities that provides
a basis for effective management of risk.

Application Programming Interface - correct answer-A library of commands maintained by a
system for other programs to use, provides consistency and integrity for the programs

Archival Data - correct answer-Archival Data is information that is not directly accessible to
the user of a computer system but that the organization maintains for long-term storage and
record keeping purposes.

Assembler - correct answer-Converts a high level language into machine language

, Asset management - correct answer-Involved knowing and keeping all company's IT assets
up to date

Assurance - correct answer-Degree of confidence that certain security level provided

Asymmetric - correct answer-Encryption system using a pair of mathematically related
unequal keys

Asymmetric algorithms - correct answer-RSA, ECC, Diffie-Hellman, El Gamal, Knapsack,
and DSA

Asymmetric Key - correct answer-Provide authentication or nonrepudiation, but is slower
than its counterpart

Asynchronous - correct answer-Encrypt/Decrypt are processes in queues, key benefit
utilization of hardware devices and multiprocessor systems

Asynchronous communication - correct answer-Transfers data by sending bits of data in
irregular timing patterns

Atomicity - correct answer-Indivisible, data field must contain only one value that either all
transactions take place or none do

Atomicity, Consistency, Isolation, Durability - correct answer-A set of best practices for
programmers to seek in all application or data base design

Audit - correct answer-Ensured system accountability

Authentic, accurate, complete, convincing, admissible - correct answer-5 Rules of evidence

Authentication - Biometric - correct answer-one-to-one search to verify identity

Authentication Header - correct answer-Provides integrity, authentication, and (depend on
the the algorithm) nonrepudation

Bastion host - correct answer-A strongly protected computer that is in a network protected by
a
firewall (or is part of a firewall) and is the only host (or one of only a few hosts) in the network
that can be directly accessed from networks
on the other side of the firewall

Binary - correct answer-Ertaining to a number system that has just two unique digits.

Birthday - correct answer-The attacker tries to create two messages with the same hashing
value, brute force

Bit - correct answer-A measurement of data. It is the smallest unit of data. A bit is either the
"1" or "0" component of the binary code.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Hkane. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78075 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart