Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISMP REVISION QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS VERIFIED LATEST UPDATE

Beoordeling
-
Verkocht
-
Pagina's
41
Cijfer
A+
Geüpload op
14-10-2024
Geschreven in
2024/2025

CISMP REVISION QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS VERIFIED LATEST UPDATE What is protective monitoring? Ensuring that system owners are provided with a real-time feed of information regarding the status of ICT systems, providing awareness of activities of the threat sources and enabling security incidents to be detected, investigated and effectively remediated Define information security The protection of information and information systems from unauthorised access, use, disclosure, disruption, modification, or disruption. Outline what ISO27000, ISO27001, ISO27005 and ISO Guide 73 are for. ISO27000: Overview and vocab ISO27001: Internationally recognised specification for an Information Security Management System ISO27005: Information Security Risk Management ISO Guide 73: Risk Management What type of assets are protected? (name 6) Information, software, physical, services, people, intangible. What is the CIA triad in security? Confidentiality - non disclosure, access on a need to know basis, least privilege Integrity - protecting the accuracy and completeness of assets Availability - reliability and timely access to data or IT resources by appropriate people What is non repudiation? The ability to prove the occurrence of a claimed event or action and its originating entities. What is defence in depth? Layering security to provide redundancy and to buy time to detect and enact a response. Examples include SSO, firewall, TLS, fences, walls, badges, data classification, password strength What is IAAA? Identity - usernames, etc, who a user is Authentication - proving the user is who they say they are, using a password, etc Authorisation - ensuring that user can only access what they are authorised to access Accounting/ Auditing - record of actions taken and can be traced back What are the three primary strands of security governance? Governance, Risk Management, Compliance How does security as an enabler work? Delivering value rather than cost Enable new ways of working

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CISMP REVISION QUESTIONS AND ANSWERS WITH COMPLETE

SOLUTIONS VERIFIED LATEST UPDATE


What is protective monitoring?

Ensuring that system owners are provided with a real-time feed of information regarding

the status of ICT systems, providing awareness of activities of the threat sources and

enabling security incidents to be detected, investigated and effectively remediated

Define information security

The protection of information and information systems from unauthorised access, use,

disclosure, disruption, modification, or disruption.

Outline what ISO27000, ISO27001, ISO27005 and ISO Guide 73 are for.

ISO27000: Overview and vocab

ISO27001: Internationally recognised specification for an Information Security

Management System

ISO27005: Information Security Risk Management

ISO Guide 73: Risk Management

What type of assets are protected? (name 6)

Information, software, physical, services, people, intangible.

What is the CIA triad in security?

Confidentiality - non disclosure, access on a need to know basis, least privilege



Integrity - protecting the accuracy and completeness of assets

,Availability - reliability and timely access to data or IT resources by appropriate people

What is non repudiation?

The ability to prove the occurrence of a claimed event or action and its originating

entities.

What is defence in depth?

Layering security to provide redundancy and to buy time to detect and enact a

response.



Examples include SSO, firewall, TLS, fences, walls, badges, data classification,

password strength

What is IAAA?

Identity - usernames, etc, who a user is

Authentication - proving the user is who they say they are, using a password, etc

Authorisation - ensuring that user can only access what they are authorised to access

Accounting/ Auditing - record of actions taken and can be traced back

What are the three primary strands of security governance?

Governance, Risk Management, Compliance

How does security as an enabler work?

Delivering value rather than cost



Enable new ways of working

,Improve working practices

Minimise costs

What is compliance?

Conforming to:

rules

policies

standards

law

legal contracts

What is risk defined as?

The effect of uncertainty on objectives.

How is risk calculated?

Risk = likelihood x impact



Identify a vulnerability and evaluate the likelihood of it being exploited by a threat and

the impact that a successful exploit would have.

What is a vulnerability?

A weakness that could be triggered accidentally or exploited intentionally to cause a

security breach.



Examples include improper configurations, misuse of software or communication

protocols, untested software and firmware patches, poorly designed network

architecture, insecure password usage, design flaws, etc.

, What is a threat?

The potential for someone or something to exploit a vulnerability and breach security.

May be intentional or unintentional.



Examples include hackers, cyberterrorists, criminal gangs, earthquakes, floods,

hurricanes, etc.

What are the five threat categories?

External, internal, deliberate, multiparty and accidental.



Multiparty is relevant to third party or supplier issues which can arise from the impact to

multiple organisations.

Accidental could be an engineer accidentally cutting important cables for power supply

while doing his job.

What are some examples of vulnerabilities?

General:

Lack of physical controls

Lack of pre-employment checks



Information specific:

Lack of security patches

No firewall on a website

Out of date antivirus software

What is the difference between quantitative and qualitative in risk evaluation?

Geschreven voor

Vak

Documentinformatie

Geüpload op
14 oktober 2024
Aantal pagina's
41
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NurseAdvocate chamberlain College of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
497
Lid sinds
2 jaar
Aantal volgers
77
Documenten
12046
Laatst verkocht
2 dagen geleden
NURSE ADVOCATE

I have solutions for following subjects: Nursing, Business, Accounting, statistics, chemistry, Biology and all other subjects. Nursing Being my main profession line, I have essential guides that are Almost A+ graded, I am a very friendly person: If you would not agreed with my solutions I am ready for refund

4.6

239 beoordelingen

5
193
4
14
3
15
2
6
1
11

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen