CISSP Official ISC2 Practice Tests by Chapple Mike; Seidl David; & Mike Chapple

CISSP Official ISC2 Practice Tests by Chapple Mike; Seidl David; & Mike Chapple

Author:Chapple, Mike; Seidl, David; & Mike Chapple [Seidl, David & Chapple, Mike]
Language: eng
Format: epub
ISBN: 9781119252290
Publisher: John Wiley & Sons, Incorporated
Published: 2016-06-03T00:00:00+00:00


Chapter 2: Asset Security (Domain 2)

C. Encryption is often used to protect traffic like bank transactions from sniffing. While packet injection and man-in-the-middle attacks are possible, they are far less likely to occur, and if a VPN were used, it would be used to provide encryption. TEMPEST is a specification for techniques used to prevent spying using electromagnetic emissions and wouldn’t be used to stop attacks at any normal bank.

A. Business owners have to balance the need to provide value with regulatory, security, and other requirements. This makes the adoption of a common framework like COBIT attractive. Data owners are more likely to ask that those responsible for control selection identify a standard to use. Data processors are required to perform specific actions under regulations like the EU DPD. Finally, in many organizations, data stewards are internal roles that oversee how data is used.

B. A baseline is used to ensure a minimum security standard. A policy is the foundation that a standard may point to for authority, and a configuration guide may be built from a baseline to help staff who need to implement it to accomplish their task. An outline is helpful, but outline isn’t the term you’re looking for here.

B. Media is typically labeled with the highest classification level of data it contains. This prevents the data from being handled or accessible at a lower classification level. Data integrity requirements may be part of a classification process but don’t independently drive labeling in a classification scheme.

A. The need to protect sensitive data drives information classification. This allows organizations to focus on data that needs to be protected rather than spending effort on less important data. Remanence describes data left on media after an attempt is made to remove the data. Transmitting data isn’t a driver for an administrative process to protect sensitive data, and clearing is a technical process for removing data from media.

A. A data retention policy can help to ensure that outdated data is purged, removing potential additional costs for discovery. Many organizations have aggressive retention policies to both reduce the cost of storage and limit the amount of data that is kept on hand and discoverable.

Data retention policies are not designed to destroy incriminating data, and legal requirements for data retention must still be met.

D. Custodians are delegated the role of handling day-to-day tasks by managing and overseeing how data is handled, stored, and protected. Data processors are systems used to process data. Business owners are typically project or system owners who are tasked with making sure systems provide value to their users or customers.

D. Safe Harbor compliance helps US companies meet the EU Data Protection Directive. Yearly assessments may be useful, but they aren’t required. HIPAA is a US law that applies specifically to healthcare and related organizations, and encrypting all data all the time is impossible (at least if you want to use the data!).

C. Security baselines provide a starting point to scope and tailor security controls to your organization’s needs. They aren’t



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide by Glen D. Singh(1544)
CISA - Certified Information Systems Auditor Study Guide by Hemang Doshi(1256)
Implementing Microsoft Azure Architect Technologies: AZ-303 Exam Prep and Beyond by Brett Hargreaves and Sjoukje Zaal(1154)
Microsoft Python Certification Exam 98-281 & PCEP –Preparation Guide: Introduction To Programming Using Python, PCEP – Certified Entry Level Python Programmer by Raman Archith & Raman Dhyanashri & Raman R & Publications Raman(792)
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002) by Brent Chapman(597)
CompTIA Security+: SY0-601 Certification Guide Second Edition by Ian Neil(543)
CompTIA PenTest+ Certification For Dummies by Glen E. Clarke(520)
Exam Ref AZ-500 Microsoft Azure Security Technologies by Yuri Diogenes & Orin Thomas(481)
CCNP Data Center Application Centric Infrastructure 300-620 DCACI Official Cert Guide by Ammar Ahmadi(468)
AZ-303 : Microsoft Azure Architect Technologies : Volume : 01 by Specialist IP(466)
Casp+ Comptia Advanced Security Practitioner Certification All-in-one Exam Guide, Exam Cas-003 (9781260441345) by Lane Nicholas; Conklin Arthur; White Gregory B.; Williams Dwayne(433)
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) by Raymond Nutting(422)
Official Google Cloud Certified Associate Cloud Engineer Study Guide by Dan Sullivan(401)
CompTIA Security+ Practice Tests by David Seidl(390)
AWS Certified Solutions Architect Study Guide Associate (SAA-C01) Exam Second Edition by Ben Piper & David Clinton(365)
AWS Certified SysOps Administrator Practice Tests 2021: AWS Exam-Difficulty Practice Questions with Answers & detailed Explanations by Davis Neal(351)
Exam Ref MS-500 Microsoft 365 Security Administration by Ed Fisher & Nate Chamberlain(334)
AWS Certified SysOps Administrator Study Guide by Sara Perrott & Brett McLaughlin(331)
OCP Oracle Certified Professional Java SE 11 Developer Complete Study Guide by Jeanne Boyarsky & Scott Selikoff(321)
Redis Certified Developer: Exam Practice Tests by Scutaru Cristian(319)