CISSP Official (ISC)2 Practice Tests by Mike Chapple & David Seidl

CISSP Official (ISC)2 Practice Tests by Mike Chapple & David Seidl

Author:Mike Chapple & David Seidl [Chapple, Mike]
Language: eng
Format: azw3, epub, pdf
ISBN: 9781119252290
Publisher: Wiley
Published: 2016-07-05T04:00:00+00:00


Chapter 2: Asset Security (Domain 2)

C. Encryption is often used to protect traffic like bank transactions from sniffing. While packet injection and man-in-the-middle attacks are possible, they are far less likely to occur, and if a VPN were used, it would be used to provide encryption. TEMPEST is a specification for techniques used to prevent spying using electromagnetic emissions and wouldn’t be used to stop attacks at any normal bank.

A. Business owners have to balance the need to provide value with regulatory, security, and other requirements. This makes the adoption of a common framework like COBIT attractive. Data owners are more likely to ask that those responsible for control selection identify a standard to use. Data processors are required to perform specific actions under regulations like the EU DPD. Finally, in many organizations, data stewards are internal roles that oversee how data is used.

B. A baseline is used to ensure a minimum security standard. A policy is the foundation that a standard may point to for authority, and a configuration guide may be built from a baseline to help staff who need to implement it to accomplish their task. An outline is helpful, but outline isn’t the term you’re looking for here.

B. Media is typically labeled with the highest classification level of data it contains. This prevents the data from being handled or accessible at a lower classification level. Data integrity requirements may be part of a classification process but don’t independently drive labeling in a classification scheme.

A. The need to protect sensitive data drives information classification. This allows organizations to focus on data that needs to be protected rather than spending effort on less important data. Remanence describes data left on media after an attempt is made to remove the data. Transmitting data isn’t a driver for an administrative process to protect sensitive data, and clearing is a technical process for removing data from media.

A. A data retention policy can help to ensure that outdated data is purged, removing potential additional costs for discovery. Many organizations have aggressive retention policies to both reduce the cost of storage and limit the amount of data that is kept on hand and discoverable.

Data retention policies are not designed to destroy incriminating data, and legal requirements for data retention must still be met.

D. Custodians are delegated the role of handling day-to-day tasks by managing and overseeing how data is handled, stored, and protected. Data processors are systems used to process data. Business owners are typically project or system owners who are tasked with making sure systems provide value to their users or customers.

D. Safe Harbor compliance helps US companies meet the EU Data Protection Directive. Yearly assessments may be useful, but they aren’t required. HIPAA is a US law that applies specifically to healthcare and related organizations, and encrypting all data all the time is impossible (at least if you want to use the data!).

C. Security baselines provide a starting point to scope and tailor security controls to your organization’s needs. They aren’t



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9823)
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide by Eric McLeroy(6485)
The KCNA Book by Nigel Poulton(4412)
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 by Dwayne Natwick(3767)
Designing and Implementing Microsoft Azure Networking Solutions by David Okeyode(3674)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart and Joe Anich(3632)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart & Joe Anich(3556)
TCP IP by Todd Lammle(3012)
Microsoft Power BI Data Analyst Certification Guide by Ed Corcoran Orrin Edenfield(2935)
Unity Certified Programmer: Exam Guide by Philip Walker(2724)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2533)
Networking A Beginner's Guide by Bruce Hallberg(2230)
Microsoft Power Platform Solution Architect's Handbook by Hugo Herrera(2064)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1878)
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102) by Ian Neil and Mark Birch(1816)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(1679)
PHP 7 Zend Certification Study Guide by Andrew Beak(1661)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1561)
CompTIA A+ Certification Guide (220-901 and 220-902) by Matthew Bennett(1541)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(1499)