100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISSP – PRACTICE QUESTIONS WITH ACCURATE ANSWERS $16.99
Add to cart

Exam (elaborations)

CISSP – PRACTICE QUESTIONS WITH ACCURATE ANSWERS

 0 purchase
  • Course
  • CISSP
  • Institution
  • CISSP

CISSP – PRACTICE QUESTIONS WITH ACCURATE ANSWERS

Preview 4 out of 72  pages

  • December 21, 2024
  • 72
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISSP
  • CISSP
avatar-seller
Studyglobal
CISSP - Practice
Data Remanence Accurate Answer - The remains of partial or even the
entire data set of digital information



Disaster Recovery Planning (DRP) Accurate Answer - Deals with
restoring normal business operations after the disaster takes place...works to
get the business back to normal



Maximum tolerable downtime Accurate Answer - The maximum
period of time that a critical business function can be inoperative before the
company incurs significant and long-lasting damage.



802.5 Accurate Answer - IEEE standard defines the Token Ring media
access method



Recovery Time Objective Accurate Answer - The balance against the
cost of recover and the cost of disruption




Resource Requirements Accurate Answer - portion of the BIA that lists
the resources that an organization needs in order to continue operating each
critical business function.



Checklist Accurate Answer - Test is one in which copies of the plan are
handed out to each functional area to ensure the plan deal with their needs

,Information Owner Accurate Answer - The one person responsible for
data, its classification and control setting



Job Rotation Accurate Answer - To move from location to location,
keeping the same function



Differential power analysis Accurate Answer - A side-channel attack
carry-out on smart cards that examining the power emission release during
processing



Mitigate Accurate Answer - Defined as real-time monitoring and
analysis of network activity and data for potential vulnerabilities and attacks
in

progress.



Electromagnetic analysis Accurate Answer - A side-channel attack on
smart cards that examine the frequencies emitted and timing



Analysis Accurate Answer - Systematic assessment of threats and
vulnerabilities that provides a basis for effective management of risk.



Change Control Accurate Answer - Maintaining full control over
requests, implementation, traceability, and proper documentation of changes.



Containment Accurate Answer - Mitigate damage by isolating
compromised systems from the network.

,30 to 90 Days Accurate Answer - Most organizations enforce policies to
change password ranging from



Isochronous Accurate Answer - Process must within set time
constrains, applications are video related where audio and video must match
perfectly



Detection Accurate Answer - Identification and notification of an
unauthorized and/or undesired action



Electronic Vaulting Accurate Answer - Periodic, automatic and
transparent backup of data in bulk.



Fault Tolerance Accurate Answer - Mitigation of system or component
loss or interruption through use of backup capability.



Incremental Accurate Answer - A backup method use when time and
space are a high importance



Secure HTTP Accurate Answer - Protocol designed to same individual
message securely



Criminal Accurate Answer - Conduct that violates government laws
developed to protect society

, Class C Accurate Answer - Has 256 hosts



RAID 0 Accurate Answer - Creates one large disk by using several disks



Trade secrets Accurate Answer - Deemed proprietary to a company
and often include information that provides a competitive edge, the
information is protected as long the owner takes protective actions



X.400 Accurate Answer - Active Directory standard



Prevention Accurate Answer - Controls deployed to avert unauthorized
and/or undesired actions.



Redundant Array Of Independent Drives (RAID) Accurate Answer - A
group of hard drives working as one storage unit for the purpose of speed and
fault tolerance



Proprietary Accurate Answer - Define the way in which the
organization operates.



Gateway Accurate Answer - Used to connect two networks using
dissimilar protocols at different layers of the OSI model



Classification Accurate Answer - The assignment of a level of
sensitivity to data (or information) that results in the specification of controls
for each level of classification.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Studyglobal. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $16.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

70113 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 15 years now

Start selling
$16.99
  • (0)
Add to cart
Added