Cissp stuvia - Study guides, Class notes & Summaries

Looking for the best study guides, study notes and summaries about Cissp stuvia? On this page you'll find 36 study documents about Cissp stuvia.

Page 3 out of 36 results

Sort by

CISSP Exam 2| Correct Questions| Answers| Verified!!
  • CISSP Exam 2| Correct Questions| Answers| Verified!!

  • Exam (elaborations) • 3 pages • 2023
  • Layer 2 of the OSI model is called the transport layer. - ANSWER False The IP address 192.168.5.5 is a private IP address according to RFC 1918. - ANSWER True The contention method used in Ethernet is called Token passing. - ANSWER False A Metropolitan-area network (MAN) is a type of LAN that encompasses a large area such as the downtown of a city. - ANSWER True 802.11g operates at a maximum of 11 Mbps - ANSWER False Wired Equivalent Privacy (WEP) was the first security measure us...
    (0)
  • $10.99
  • + learn more
CISSP module 1 exam| Complete Questions| Correct Answers| Verified!!
  • CISSP module 1 exam| Complete Questions| Correct Answers| Verified!!

  • Exam (elaborations) • 2 pages • 2023
  • An organization is implementation g a preselected baseline of security controls but finds that some of the controls aren't relevant to their needs. What should they do - ANSWER Tailor the baseline to their requirements An admin is planning to deploy a database server and wants to ensure it is secure. She reviews a list of baseline security controls and identifies the security controls that apply to this database server. What is it called - ANSWER Scoping A data policy mandates teh use of ...
    (0)
  • $9.99
  • + learn more
CISSP – Practice Complete Questions & Answers(Latest Update 2023)
  • CISSP – Practice Complete Questions & Answers(Latest Update 2023)

  • Exam (elaborations) • 36 pages • 2023
  • Data Remanence - ANSWER The remains of partial or even the entire data set of digital information Disaster Recovery Planning (DRP) - ANSWER Deals with restoring normal business operations after the disaster takes place...works to get the business back to normal Maximum tolerable downtime - ANSWER The maximum period of time that a critical business function can be inoperative before the company incurs significant and long-lasting damage. 802.5 - ANSWER IEEE standard defines the Token Rin...
    (0)
  • $12.49
  • + learn more
CISSP Exam Correct Questions & Answers(Latest Update 2023)
  • CISSP Exam Correct Questions & Answers(Latest Update 2023)

  • Exam (elaborations) • 24 pages • 2023
  • CIA Triangle - ANSWER Cornerstone of infosec. Confidentiality, Integrity, Availability Confidentiality (CIA Triangle) - ANSWER prevention of unauthorized disclosure of information; prevention of unauthorized read access to data Integrity (CIA Triangle) - ANSWER prevention of unauthorized modification of data; prevention of unauthorized write access to data Availability (CIA Triangle) - ANSWER ensures data is available when needed to authorized users Opposing forces to CIA - ANSWER DA...
    (0)
  • $10.99
  • + learn more
CISSP Exam Study Notes| Complete Questions| Correct 100%(GRADED A)
  • CISSP Exam Study Notes| Complete Questions| Correct 100%(GRADED A)

  • Exam (elaborations) • 34 pages • 2023
  • What is the CIA triad? - ANSWER Confidentiality, Integrity, and Availability. Which are the elements of the information system that each organization is trying to protect. Confidentiality - ANSWER the concept of the measures used to ensure the protection of the security of the data, objects, or resources. The goal is to prevent or minimize unauthorized access to data. I.E. encryption, access controls, and steganography. Access Control - ANSWER The management of the relationship between sub...
    (0)
  • $7.99
  • + learn more
CISSP Exam Cram| Correct Questions And Answers| Verified
  • CISSP Exam Cram| Correct Questions And Answers| Verified

  • Exam (elaborations) • 41 pages • 2023
  • Policy - ANSWER A high-level document that dictates management intentions toward security. Trademark - ANSWER A symbol, word, name, sound or thing that identifies the origin of a product or service in a particular trade. Patent - ANSWER Documents a process or synthesis and grants the owner a legally enforceable right to exclude others from using it Copyright - ANSWER A legal device that provides creator the right to control how the work is used. For Life plus 70 years Data Mining - A...
    (0)
  • $10.99
  • + learn more
CISSP EXAM| 175 Questions| Correct Answers| Verified
  • CISSP EXAM| 175 Questions| Correct Answers| Verified

  • Exam (elaborations) • 23 pages • 2023
  • Half-duplex mode is being used for communication between two applications. At which layer of the OSI model is this connection being established?. - ANSWER Layer 5: the session layer, is responsible for setting up connections between applications, maintaining dialog control, and negotiating, establishing, maintaining, and ending the communication channel. This layer is responsible for name recognition and identification so that only the designated parties can participate in the session. A connect...
    (0)
  • $11.49
  • + learn more
CISSP Practice Test 1 250 Correct Questions And Answers
  • CISSP Practice Test 1 250 Correct Questions And Answers

  • Exam (elaborations) • 31 pages • 2023
  • baseline - ANSWER NIST SP 800-53 discusses security control baselines as a list of security controls. CIS releases security baselines, and a baseline is a useful part of a threat management strategy and may contain a list of acceptable configuration items. *Content Distribution Network (CDN) - ANSWER is designed to provide reliable, low-latency, geographically distributed content distribution. In this scenario, a CDN is an ideal solution. A P2P CDN like BitTorrent isn't a typical choice for ...
    (0)
  • $12.49
  • + learn more
CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A)
  • CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A)

  • Exam (elaborations) • 8 pages • 2023
  • CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) CISSP Exam Guide Applicati...
    (0)
  • $11.99
  • + learn more
CISSP Exam 2| Correct Questions| Answers| Verified
  • CISSP Exam 2| Correct Questions| Answers| Verified

  • Exam (elaborations) • 3 pages • 2023
  • Layer 2 of the OSI model is called the transport layer. - ANSWER False The IP address 192.168.5.5 is a private IP address according to RFC 1918. - ANSWER True The contention method used in Ethernet is called Token passing. - ANSWER False A Metropolitan-area network (MAN) is a type of LAN that encompasses a large area such as the downtown of a city. - ANSWER True 802.11g operates at a maximum of 11 Mbps - ANSWER False Wired Equivalent Privacy (WEP) was the first security measure us...
    (0)
  • $10.99
  • + learn more