100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Official Question and answers 100% correct 2024 €13,34   In winkelwagen

Tentamen (uitwerkingen)

Official Question and answers 100% correct 2024

 3 keer bekeken  0 keer verkocht
  • Vak
  • CISSP - Certified Information Systems Security Professional
  • Instelling
  • CISSP - Certified Information Systems Security Professional

Official Question and answers 100% correct 2024 Administrative Controls - correct answer Procedures implemented to define the roles, responsibilities, policies, and administrative functions needed to manage the control environment. Annualized Rate of Occurrence (ARO) - correct answer An e...

[Meer zien]

Voorbeeld 4 van de 44  pagina's

  • 16 april 2024
  • 44
  • 2023/2024
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • CISSP - Certified Information Systems Security Professional
  • CISSP - Certified Information Systems Security Professional
avatar-seller
Official (ISC)² CISSP (All Domains)
Administrative Controls - correct answer Procedures implemented to define the roles, responsibilities, policies, and administrative functions needed to manage the control environment.
Annualized Rate of Occurrence (ARO) - correct answer An estimate of how often a threat will be successful in exploiting a vulnerability over the period of a year.
Arms Export Control Act of 1976 - correct answer Authorizes the President to designate those items that shall be considered as defense articles and defense services and control their import and the export.
Availability - correct answer The principle that ensures that information is available and accessible to users when needed.
Breach - correct answer An incident that results in the disclosure or potential
exposure of data.
Compensating Controls - correct answer Controls that substitute for the loss
of primary controls and mitigate risk down to an acceptable level.
Compliance - correct answer Actions that ensure behavior that complies with established rules.
Confidentiality - correct answer Supports the principle of "least privilege" by providing that only authorized individuals, processes, or systems should have access to information on a need-to-know basis. Copyright - correct answer Covers the expression of ideas rather than the ideas themselves; it usually protects artistic property such as writing, recordings, databases, and computer programs.
Corrective: Controls - correct answer Controls implemented to remedy circumstance, mitigate damage, or restore controls.
Data Disclosure - correct answer A breach for which it was confirmed that data was actually disclosed (not just exposed) to an unauthorized party.
Detective Controls - correct answer Controls designed to signal a warning when a security control has been breached.
Deterrent Controls - correct answer Controls designed to discourage people from violating security directives.
Directive Controls - correct answer Controls designed to specify acceptable rules of behavior within an organization.
Due Care - correct answer The care a "reasonable person" would exercise under given circumstances.
Due Diligence - correct answer Is similar to due care with the exception that it is a pre-emptive measure made to avoid harm to other persons or their property.
Enterprise Risk Management - correct answer A process designed to identify potential events that may affect the entity, manage risk so it is within its risk appetite, and provide reasonable assurance regarding the achievement of entity objectives. Export Administration Act of 1979 - correct answer Authorized the President to regulate exports of civilian goods and technologies that have military applications.
Governance - correct answer Ensures the business focuses on core activities, clarifies who in the organization has the authority to make decisions,
determines accountability for actions and responsibility for outcomes, and addresses how expected performance will be evaluated.
Incident - correct answer A security event that compromises the confidentiality, integrity, or availability of an information asset.
Integrity - correct answer Comes in two forms; making sure that information is processed correctly and not modified by unauthorized persons, and protecting information as it transits a network.
Information Security Officer - correct answer Accountable for ensuring the protection of all of the business information assets from intentional and unintentional loss, disclosure, alteration, destruction, and unavailability.
Least Privilege - correct answer Granting users only the accesses that are required to perform their job functions.
Logical (Technical) Controls - correct answer Electronic hardware and software solutions implemented to control access to information and information networks.
Patent - correct answer Protects novel, useful, and nonobvious inventions. Physical Controls - correct answer Controls to protect the organization's people and physical environment, such as locks, fire management, gates, and
guards; physical controls may be called "operational controls" in some contexts.
Preventive Controls - correct answer Controls implemented to prevent a security incident or information breach.
Recovery Controls - correct answer Controls implemented to restore conditions to normal after a security incident.
Recovery Time Objective (RTO) - correct answer How quickly you need to have that application's information available after downtime has occurred.
Recovery Point Objective (RPO) - correct answer The point in time to which data must be restored in order to successfully resume processing.
Risk - correct answer 1. A combination of the probability of an event and its consequence (ISO 27000) 2. An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.(RFC 2828)
Risk Acceptance - correct answer The practice of accepting certain risk(s), typically based on a business decision that may also weigh the cost versus the benefit of dealing with the risk in another way.
Risk Avoidance - correct answer The practice of coming up with alternatives
so that the risk in question is not realized.
Risk Mitigation - correct answer The practice of the elimination of or the significant decrease in the level of risk presented.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper flyhigher329. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €13,34. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 76449 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€13,34
  • (0)
  Kopen