(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests by Mike Chapple & David Seidl

(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests by Mike Chapple & David Seidl

Author:Mike Chapple & David Seidl [Chapple, Mike & Seidl, David]
Language: eng
Format: epub
ISBN: 9781119787648
Publisher: Wiley
Published: 2021-06-29T00:00:00+00:00


Medical records are an example of protected health information (PHI). Trade secrets are an example of proprietary data. Social Security numbers and driver's license numbers are examples of PII; if they were used in a medical context, they may also be PHI, but this question does not ask you to consider them in that context.

Chapter 3: Security Architecture and Engineering (Domain 3)

D. The Brewer-Nash model allows access controls to change dynamically based upon a user's actions. It is often used in environments like Matthew's to implement a “Chinese wall” between data belonging to different clients.

A. Fires may be detected as early as the incipient stage. During this stage, air ionization takes place, and specialized incipient fire detection systems can identify these changes to provide early warning of a fire.

A. Closed-circuit television (CCTV) systems act as a secondary verification mechanism for physical presence because they allow security officials to view the interior of the facility when a motion alarm sounds to determine the current occupants and their activities.

B. In an m of n control system, at least m of n possible escrow agents must collaborate to retrieve an encryption key from the escrow database.

A. This is an example of a vendor offering a fully functional application as a web-based service. Therefore, it fits under the definition of software as a service (SaaS). In infrastructure as a service (IaaS), compute as a service (CaaS), and platform as a service (PaaS) approaches, the customer provides their own software. In this example, the vendor is providing the email software, so none of those choices is appropriate.

B. The Digital Signature Standard approves three encryption algorithms for use in digital signatures: the Digital Signature Algorithm (DSA); the Rivest, Shamir, Adleman (RSA) algorithm; and the Elliptic Curve DSA (ECDSA) algorithm. HAVAL is a hash function, not an encryption algorithm. While hash functions are used as part of the digital signature process, they do not provide encryption.

A. In the subject/object model of access control, the user or process making the request for a resource is the subject of that request. In this example, Harry is requesting resource access and is, therefore, the subject.

C. Michael should conduct his investigation, but there is a pressing business need to bring the website back online. The most reasonable course of action would be to take a snapshot of the compromised system and use the snapshot for the investigation, restoring the website to operation as quickly as possible while using the results of the investigation to improve the security of the site.

C. Using a sandbox is an example of confinement, where the system restricts the access of a particular process to limit its ability to affect other processes running on the same system.

D. Assurance is the degree of confidence that an organization has that its security controls are correctly implemented. It must be continually monitored and reverified.

A. Maintenance hooks, otherwise known as backdoors, provide developers with easy access to a system, bypassing normal security controls. If not removed prior to finalizing code, they pose a significant security vulnerability if an attacker discovers the maintenance hook.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide by Glen D. Singh(1668)
CISA - Certified Information Systems Auditor Study Guide by Hemang Doshi(1380)
Implementing Microsoft Azure Architect Technologies: AZ-303 Exam Prep and Beyond by Brett Hargreaves and Sjoukje Zaal(1267)
Microsoft Python Certification Exam 98-281 & PCEP –Preparation Guide: Introduction To Programming Using Python, PCEP – Certified Entry Level Python Programmer by Raman Archith & Raman Dhyanashri & Raman R & Publications Raman(832)
CompTIA Security+: SY0-601 Certification Guide Second Edition by Ian Neil(664)
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) by Brent Chapman(646)
CompTIA PenTest+ Certification For Dummies by Glen E. Clarke(590)
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide by Ammar Ahmadi(556)
Exam Ref AZ-500 Microsoft Azure Security Technologies by Yuri Diogenes & Orin Thomas(529)
AZ-303 : Microsoft Azure Architect Technologies : Volume : 01 by Specialist IP(510)
CompTIA Security+ Practice Tests by David Seidl(502)
Casp+ Comptia Advanced Security Practitioner Certification All-in-one Exam Guide, Exam Cas-003 (9781260441345) by Lane Nicholas; Conklin Arthur; White Gregory B.; Williams Dwayne(472)
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) by Raymond Nutting(460)
Official Google Cloud Certified Associate Cloud Engineer Study Guide by Dan Sullivan(450)
AWS Certified Solutions Architect Study Guide Associate (SAA-C01) Exam Second Edition by Ben Piper & David Clinton(411)
AWS Certified SysOps Administrator Practice Tests 2021: AWS Exam-Difficulty Practice Questions with Answers & detailed Explanations by Davis Neal(393)
Cisco Certified DevNet Associate DEVASC 200-901 Official Cert Guide by Chris Jackson & Adrian Iliesiu & Ashutosh Malegaonkar & Jason Gooley(386)
Redis Certified Developer: Exam Practice Tests by Scutaru Cristian(371)
AWS Certified SysOps Administrator Study Guide by Sara Perrott & Brett McLaughlin(368)
Exam Ref MS-500 Microsoft 365 Security Administration by Ed Fisher & Nate Chamberlain(366)