Cissp stuvia - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Cissp stuvia? On this page you'll find 36 study documents about Cissp stuvia.
Page 3 out of 36 results
Sort by
-
CISSP Exam 2| Correct Questions| Answers| Verified!!
- Exam (elaborations) • 3 pages • 2023
-
Available in package deal
-
- $10.99
- + learn more
Layer 2 of the OSI model is called the transport layer. - ANSWER False 
 
The IP address 192.168.5.5 is a private IP address according to RFC 1918. - ANSWER True 
 
The contention method used in Ethernet is called Token passing. - ANSWER False 
 
A Metropolitan-area network (MAN) is a type of LAN that encompasses a large area such as the downtown of a city. - ANSWER True 
 
802.11g operates at a maximum of 11 Mbps - ANSWER False 
 
Wired Equivalent Privacy (WEP) was the first security measure us...
-
CISSP module 1 exam| Complete Questions| Correct Answers| Verified!!
- Exam (elaborations) • 2 pages • 2023
-
Available in package deal
-
- $9.99
- + learn more
An organization is implementation g a preselected baseline of security controls but finds that some of the controls aren't relevant to their needs. What should they do - ANSWER Tailor the baseline to their requirements 
 
An admin is planning to deploy a database server and wants to ensure it is secure. She reviews a list of baseline security controls and identifies the security controls that apply to this database server. What is it called - ANSWER Scoping 
 
A data policy mandates teh use of ...
-
CISSP – Practice Complete Questions & Answers(Latest Update 2023)
- Exam (elaborations) • 36 pages • 2023
-
- $12.49
- + learn more
Data Remanence - ANSWER The remains of partial or even the entire data set of digital information 
 
Disaster Recovery Planning (DRP) - ANSWER Deals with restoring normal business operations after the disaster takes place...works to get the business back to normal 
 
Maximum tolerable downtime - ANSWER The maximum period of time that a critical business function can be inoperative before the company incurs significant and long-lasting damage. 
 
802.5 - ANSWER IEEE standard defines the Token Rin...
-
CISSP Exam Correct Questions & Answers(Latest Update 2023)
- Exam (elaborations) • 24 pages • 2023
-
- $10.99
- + learn more
CIA Triangle - ANSWER Cornerstone of infosec. Confidentiality, Integrity, Availability 
 
Confidentiality (CIA Triangle) - ANSWER prevention of unauthorized disclosure of information; prevention of unauthorized read access to data 
 
Integrity (CIA Triangle) - ANSWER prevention of unauthorized modification of data; prevention of unauthorized write access to data 
 
Availability (CIA Triangle) - ANSWER ensures data is available when needed to authorized users 
 
Opposing forces to CIA - ANSWER DA...
-
CISSP Exam Study Notes| Complete Questions| Correct 100%(GRADED A)
- Exam (elaborations) • 34 pages • 2023
-
- $7.99
- + learn more
What is the CIA triad? - ANSWER Confidentiality, Integrity, and Availability. Which are the elements of the information system that each organization is trying to protect. 
 
Confidentiality - ANSWER the concept of the measures used to ensure the protection of the security of the data, objects, or resources. The goal is to prevent or minimize unauthorized access to data. I.E. encryption, access controls, and steganography. 
 
Access Control - ANSWER The management of the relationship between sub...
As you read this, a fellow student has made another $4.70
-
CISSP Exam Cram| Correct Questions And Answers| Verified
- Exam (elaborations) • 41 pages • 2023
-
- $10.99
- + learn more
Policy - ANSWER A high-level document that dictates management intentions toward security. 
 
Trademark - ANSWER A symbol, word, name, sound or thing that identifies the origin of a product or service in a particular trade. 
 
Patent - ANSWER Documents a process or synthesis and grants the owner a legally enforceable right to exclude others from using it 
 
Copyright - ANSWER A legal device that provides creator the right to control how the work is used. For Life plus 70 years 
 
Data Mining - A...
-
CISSP EXAM| 175 Questions| Correct Answers| Verified
- Exam (elaborations) • 23 pages • 2023
-
- $11.49
- + learn more
Half-duplex mode is being used for communication between two applications. At which layer of the OSI model is this connection being established?. - ANSWER Layer 5: the session layer, is responsible for setting up connections between applications, maintaining dialog control, and negotiating, establishing, maintaining, and ending the communication channel. This layer is responsible for name recognition and identification so that only the designated parties can participate in the session. A connect...
-
CISSP Practice Test 1 250 Correct Questions And Answers
- Exam (elaborations) • 31 pages • 2023
-
- $12.49
- + learn more
baseline - ANSWER NIST SP 800-53 discusses security control baselines as a list of security controls. CIS releases security baselines, and a baseline is a useful part of a threat management strategy and may contain a list of acceptable configuration items. 
 
*Content Distribution Network (CDN) - ANSWER is designed to provide reliable, low-latency, geographically distributed content distribution. In this scenario, a CDN is an ideal solution. A P2P CDN like BitTorrent isn't a typical choice for ...
-
CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A)
- Exam (elaborations) • 8 pages • 2023
-
- $11.99
- + learn more
CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) 
 
CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) 
 
CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) 
 
CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) 
 
CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) 
 
CISSP Exam Guide Application Security| 100 Questions| Correct 100%(RATED A) 
 
CISSP Exam Guide Applicati...
-
CISSP Exam 2| Correct Questions| Answers| Verified
- Exam (elaborations) • 3 pages • 2023
-
- $10.99
- + learn more
Layer 2 of the OSI model is called the transport layer. - ANSWER False 
 
The IP address 192.168.5.5 is a private IP address according to RFC 1918. - ANSWER True 
 
The contention method used in Ethernet is called Token passing. - ANSWER False 
 
A Metropolitan-area network (MAN) is a type of LAN that encompasses a large area such as the downtown of a city. - ANSWER True 
 
802.11g operates at a maximum of 11 Mbps - ANSWER False 
 
Wired Equivalent Privacy (WEP) was the first security measure us...
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia