Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISSP EXAM QUESTIONS AND CORRECT ANSWERS ALREADY PASSED

Beoordeling
-
Verkocht
-
Pagina's
24
Cijfer
A+
Geüpload op
13-09-2025
Geschreven in
2025/2026

CISSP EXAM QUESTIONS AND CORRECT ANSWERS ALREADY PASSED /. CIA Triangle - Answer-Cornerstone of infosec. Confidentiality, Integrity, Availability /.Confidentiality (CIA Triangle) - Answer-prevention of unauthorized disclosure of information; prevention of unauthorized read access to data /.Integrity (CIA Triangle) - Answer-prevention of unauthorized modification of data; prevention of unauthorized write access to data /.Availability (CIA Triangle) - Answer-ensures data is available when needed to authorized users /.Opposing forces to CIA - Answer-DAD: disclosure, alteration, destruction /.identification - Answer-the process by which a subject professes an identity and accountability is initiated; ex: typing a username, swiping a smart card, waving a proximity device (badging in), speaking a phrase, etc - always a two step process with authenticating /.authentication - Answer-verification that a person is who they say they are; ex: entering a password or PIN, biometrics, etc - always a two step process with identifying /.authorization - Answer-verification of a person's access or privileges to applicable data /.auditing (monitoring) - Answer-recording a log of the events and activities related to the system and subjects /.accounting (accountability) - Answer-reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions /.non-repudiation - Answer-a user cannot deny having performed a specific action /.subject - Answer-an entity that performs active functions to a system; usually a person, but can also be script or program designed to perform actions on data /.object - Answer-any passive data within the system /.ISC2 Code of Ethics Canons (4) - Answer-1. protect society, commonwealth, infrastructure 2. act honorably, justly, responsibly, legally 3. provide diligent and competent service 4. advance and protect the profession strictly applied in order; exam questions in which multiple canons could be the answer, choose the highest priority per this order /.policy - Answer-mandatory high level management directives; components of policy 1. purpose: describes the need for policy 2. scope: what systems, people, facilities, organizations are covered 3. responsibilities: specific duties of involved parties 4. compliance: effectiveness of policy, violations of policy /.procedure - Answer-low level step by step guide for accomplishing a task /.standard - Answer-describes the specific use of technology applied to hardware or software; mandatory /.guideline - Answer-discretionary recommendations (e.g. not mandatory) /.baseline - Answer-a uniform way of implementing a standard /.3 access/security control categories - Answer-1. administrative: implemented by creating org policy, procedure, regulation. user awareness/training also fall here 2. technical: implemented using hardware, software, firmware that restricts logical access to a system 3. physical: locks, fences, walls, etc /.preventive access control (can be administrative, technical, physical) - Answer-prevents actions from occurring by applying restrictions on what a user can do. example: privilege level /.detective access control (can be administrative, technical, physical) - Answer-controls that alert during or after a successful attack; alarm systems, or closed circuit tv /.corrective access control (can be administrative, technical, physical) - Answer-repairing a damaged system; often works hand in hand with detective controls (e.g. antivirus software) /.recovery access control (can be administrative, technical, physical) - Answer-controls to restore a system after an incident has occurred; /.deterrent access control (can be administrative, technical, physical) - Answer-deters users from performing actions on a system /.compensating access control (can be administrative, technical, physical) - Answer-additional control used to compensate for weaknesses in other controls as needed /.risk formula - Answer-risk = threat x vulnerability x impact /.market approach (for calculating intangible assets) - Answer-assumes the fair value of an asset reflects the price which comparable assets have been purchased in transactions under similar circumstances /.income approach (for calculating intangible assets) - Answer-the value of an asset is the present value of the future earning capacity that an asset will generate over the rest of its lifecycle /.cost approach (for calculating intangible assets) - Answer-estimates the fair value based on cost of replacement /.exposure factor (EF) - Answer-percentage of value the asset lost due to incident /.single loss expectancy (SLE) - Answer-asset value (AV) times exposure factor AV x EF = SLE expressed in a dollar value /.annual rate of occurrence (ARO) - Answer-number of losses suffered per year /.annualized loss expectancy (ALE) - Answer-yearly cost due to risk SLE x ARO = ALE /.legally defensible security - Answer-to obtain legal restitution a company must demonstrate a crime was committed, suspect committed that crime, and took reasonable efforts to prevent the crime files are accurate, policy in place, proper authentication, compliance with laws and regulation /.layering (defense in depth) - Answer-the use of multiple controls in a series (one after another, linearly); no one control can protect against all possible threats; /.top down approach - Answer-senior management responsible for initiating and defining policies; middle management fleshes out policy into standards, baselines, guidelines, and procedures; end users must comply with all policies /.strategic plan - Answer-long term plan that is fairly stable; defines the org's security purpose; useful to forecast about 5 years and serves as a planning horizon - long term goals and vision (high level)

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CISSP EXAM QUESTIONS AND CORRECT ANSWERS
ALREADY PASSED

/. CIA Triangle - Answer-Cornerstone of infosec. Confidentiality, Integrity, Availability

/.Confidentiality (CIA Triangle) - Answer-prevention of unauthorized disclosure of
information; prevention of unauthorized read access to data

/.Integrity (CIA Triangle) - Answer-prevention of unauthorized modification of data;
prevention of unauthorized write access to data

/.Availability (CIA Triangle) - Answer-ensures data is available when needed to
authorized users

/.Opposing forces to CIA - Answer-DAD: disclosure, alteration, destruction

/.identification - Answer-the process by which a subject professes an identity and
accountability is initiated; ex: typing a username, swiping a smart card, waving a
proximity device (badging in), speaking a phrase, etc - always a two step process with
authenticating

/.authentication - Answer-verification that a person is who they say they are; ex:
entering a password or PIN, biometrics, etc - always a two step process with identifying

/.authorization - Answer-verification of a person's access or privileges to applicable data

/.auditing (monitoring) - Answer-recording a log of the events and activities related to
the system and subjects

/.accounting (accountability) - Answer-reviewing log files to check for compliance and
violations in order to hold subjects accountable for their actions

/.non-repudiation - Answer-a user cannot deny having performed a specific action

/.subject - Answer-an entity that performs active functions to a system; usually a person,
but can also be script or program designed to perform actions on data

/.object - Answer-any passive data within the system

/.ISC2 Code of Ethics Canons (4) - Answer-1. protect society, commonwealth,
infrastructure
2. act honorably, justly, responsibly, legally
3. provide diligent and competent service

,4. advance and protect the profession

strictly applied in order; exam questions in which multiple canons could be the answer,
choose the highest priority per this order

/.policy - Answer-mandatory high level management directives; components of policy

1. purpose: describes the need for policy
2. scope: what systems, people, facilities, organizations are covered
3. responsibilities: specific duties of involved parties
4. compliance: effectiveness of policy, violations of policy

/.procedure - Answer-low level step by step guide for accomplishing a task

/.standard - Answer-describes the specific use of technology applied to hardware or
software; mandatory

/.guideline - Answer-discretionary recommendations (e.g. not mandatory)

/.baseline - Answer-a uniform way of implementing a standard

/.3 access/security control categories - Answer-1. administrative: implemented by
creating org policy, procedure, regulation. user awareness/training also fall here
2. technical: implemented using hardware, software, firmware that restricts logical
access to a system
3. physical: locks, fences, walls, etc

/.preventive access control
(can be administrative, technical, physical) - Answer-prevents actions from occurring by
applying restrictions on what a user can do. example: privilege level

/.detective access control
(can be administrative, technical, physical) - Answer-controls that alert during or after a
successful attack; alarm systems, or closed circuit tv

/.corrective access control
(can be administrative, technical, physical) - Answer-repairing a damaged system; often
works hand in hand with detective controls (e.g. antivirus software)

/.recovery access control
(can be administrative, technical, physical) - Answer-controls to restore a system after
an incident has occurred;

/.deterrent access control
(can be administrative, technical, physical) - Answer-deters users from performing
actions on a system

, /.compensating access control
(can be administrative, technical, physical) - Answer-additional control used to
compensate for weaknesses in other controls as needed

/.risk formula - Answer-risk = threat x vulnerability x impact

/.market approach (for calculating intangible assets) - Answer-assumes the fair value of
an asset reflects the price which comparable assets have been purchased in
transactions under similar circumstances

/.income approach (for calculating intangible assets) - Answer-the value of an asset is
the present value of the future earning capacity that an asset will generate over the rest
of its lifecycle

/.cost approach (for calculating intangible assets) - Answer-estimates the fair value
based on cost of replacement

/.exposure factor (EF) - Answer-percentage of value the asset lost due to incident

/.single loss expectancy (SLE) - Answer-asset value (AV) times exposure factor
AV x EF = SLE
expressed in a dollar value

/.annual rate of occurrence (ARO) - Answer-number of losses suffered per year

/.annualized loss expectancy (ALE) - Answer-yearly cost due to risk
SLE x ARO = ALE

/.legally defensible security - Answer-to obtain legal restitution a company must
demonstrate a crime was committed, suspect committed that crime, and took
reasonable efforts to prevent the crime

files are accurate, policy in place, proper authentication, compliance with laws and
regulation

/.layering (defense in depth) - Answer-the use of multiple controls in a series (one after
another, linearly); no one control can protect against all possible threats;

/.top down approach - Answer-senior management responsible for initiating and defining
policies; middle management fleshes out policy into standards, baselines, guidelines,
and procedures; end users must comply with all policies

/.strategic plan - Answer-long term plan that is fairly stable; defines the org's security
purpose; useful to forecast about 5 years and serves as a planning horizon - long term
goals and vision (high level)

Geschreven voor

Vak

Documentinformatie

Geüpload op
13 september 2025
Aantal pagina's
24
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
kartelodoc Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
143
Lid sinds
1 jaar
Aantal volgers
7
Documenten
8353
Laatst verkocht
2 weken geleden

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Lees meer Lees minder
3.3

25 beoordelingen

5
8
4
2
3
8
2
3
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen