CISSP - Practice WITH COMPLETE SOLUTIONS 100%
CISSP - Practice WITH COMPLETE SOLUTIONS 100% Data Remanence - ANSWER The remains of partial or even the entire data set of digital information Disaster Recovery Planning (DRP) - ANSWER Deals with restoring normal business operations after the disaster takes place...works to get the business back to normal Maximum tolerable downtime - ANSWER The maximum period of time that a critical business function can be inoperative before the company incurs significant and long-lasting damage. 802.5 - ANSWER IEEE standard defines the Token Ring media access method Recovery Time Objective - ANSWER The balance against the cost of recover and the cost of disruption Resource Requirements - ANSWER portion of the BIA that lists the resources that an organization needs in order to continue operating each critical business function. Checklist - ANSWER Test is one in which copies of the plan are handed out to each functional area to ensure the plan deal with their needs Information Owner - ANSWER The one person responsible for data, its classification and control setting Job Rotation - ANSWER To move from location to location, keeping the same function Differential power analysis - ANSWER A side-channel attack carry-out on smart cards that examining the power emission release during processing Mitigate - ANSWER Defined as real-time monitoring and analysis of network activity and data for potential vulnerabilities and attacks in progress. Electromagnetic analysis - ANSWER A side-channel attack on smart cards that examine the frequencies emitted and timing Analysis - ANSWER Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk. Change Control - ANSWER Maintaining full control over requests, implementation, traceability, and proper documentation of changes. Containment - ANSWER Mitigate damage by isolating compromised systems from the network. 30 to 90 Days - ANSWER Most organizations enforce policies to change password ranging from Isochronous - ANSWER Process must within set time constrains, applications are video related where audio and video must match perfectly Detection - ANSWER Identification and notification of an unauthorized and/or undesired action Electronic Vaulting - ANSWER Periodic, automatic and transparent backup of data in bulk. Fault Tolerance - ANSWER Mitigation of system or component loss or interruption through use of backup capability. Incremental - ANSWER A backup method use when time and space are a high importance Secure HTTP - ANSWER Protocol designed to same individual message securely Criminal - ANSWER Conduct that violates government laws developed to protect society Class C - ANSWER Has 256 hosts RAID 0 - ANSWER Creates one large disk by using several disks Trade secrets - ANSWER Deemed proprietary to a company and often include information that provides a competitive edge, the information is protected as long the owner takes protective actions X.400 - ANSWER Active Directory standard Prevention - ANSWER Controls deployed to avert unauthorized and/or undesired actions. Redundant Array Of Independent Drives (RAID) - ANSWER A group of hard drives working as one storage unit for the purpose of speed and fault tolerance Proprietary - ANSWER Define the way in which the organization operates.
Written for
- Institution
- CISSP - Certified Information Systems Security Professional
- Course
- CISSP - Certified Information Systems Security Professional
Document information
- Uploaded on
- October 25, 2023
- Number of pages
- 36
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cissp practice with complete solutions 100
Also available in package deal