cissp-exam-practice-400-questions
CISSP - Practice Data Remanence ANSWER: The remains of partial or even the entire data set of digital information Disaster Recovery Planning (DRP) ANSWER: Deals with restoring normal business operations after the disaster takes place...works to get the business back to normal Maximum tolerable downtime ANSWER: The maximum period of time that a critical business function can be inoperative before the company incurs significant and long-lasting damage. 802.5 ANSWER: IEEE standard defines the Token Ring media access method Recovery Time Objective ANSWER: The balance against the cost of recover and the cost of disruption Resource Requirements ANSWER: portion of the BIA that lists the resources that an organization needs in order to continue operating each critical business function. Checklist ANSWER: Test is one in which copies of the plan are handed out to each functional area to ensure the plan deal with their needs Information Owner ANSWER: The one person responsible for data, its classification and control setting Job Rotation ANSWER: To move from location to location, keeping the same function Differential power analysis ANSWER: A side-channel attack carry-out on smart cards that examining the power emission release during processing Mitigate ANSWER: Defined as real-time monitoring and analysis of network activity and data for potential vulnerabilities and attacks in progress. Electromagnetic analysis ANSWER: A side-channel attack on smart cards that examine the frequencies emitted and timing Analysis ANSWER: Systematic assessment of threats and vulnerabilities that provides a basis for effective management of risk. Change Control ANSWER: Maintaining full control over requests, implementation, traceability, and proper documentation of changes. Containment ANSWER: Mitigate damage by isolating compromised systems from the network. 30 to 90 Days ANSWER: Most organizations enforce policies to change password ranging from Isochronous ANSWER: Process must within set time constrains, applications are video related where audio and video must match perfectly Detection ANSWER: Identification and notification of an unauthorized and/or undesired action
Geschreven voor
- Instelling
- CISSP - Certified Information Systems Security Professional
- Vak
- CISSP - Certified Information Systems Security Professional
Documentinformatie
- Geüpload op
- 3 april 2024
- Aantal pagina's
- 30
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cissp exam practice 400 questions