CISSP Practice question #17

We are implementing governance standard and control frameworks focused on stakeholder IT related goals. What should we implement?
A: COBIT.
B: ITIL.
C: COSO.
D: FRAP

CBK 1: Security and Risk Management
Source: ThorTeaches.com practice tests

Answer


A: COBIT (Control Objectives for Information and related Technology) focuses on goals for IT. Stakeholder needs are mapped down to IT related goals.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice exams and all udemy courses for $10 or $12.

To celebrate Diwali every single Udemy courses are discounted to $10 for students in India and $12 for everyone else for the next 4 days.

My 4 full CISSP practice exams below are four $10 for everyone using the coupon below.
If you follow the link you can buy anything else on udemy for $10/$12 until 10/20 at midnight PST.

CISSP study and training! | Study material recommendations image 1
CISSP certification: Full 250 question practice test #1 2017

https://goo.gl/5gciyA

CISSP study and training! | Study material recommendations image 2
CISSP certification: Full 250 question practice test #2 2017
https://goo.gl/RZxVYx

CISSP study and training! | Study material recommendations image 3
CISSP certification: Full 250 question practice test #3 2017
https://goo.gl/vgWL8p

CISSP study and training! | Study material recommendations image 4
CISSP certification: Full 250 question practice test #4 2017
https://goo.gl/F9RDx2

Other interesting courses @ $10/$12:

The Complete Cyber Security Course : Hackers Exposed! – 4.6 (5,564 ratings) – 11 hours.
https://goo.gl/u7EiF4

The Complete Ethical Hacking Course: Beginner to Advanced! 4.4 (14,282 ratings) – 24.5 hours.
https://goo.gl/DYc7me

CompTIA A+ Certification 901. The Total Course – 4.6 star rating with 4,936 ratings – 15.5 hours.
https://goo.gl/SqoCkh

CompTIA A+ Certification 902. The Total Course – 4.7 star rating with 1,298 ratings – 14 hours.
https://goo.gl/tsy4j9

CompTIA Network+ Cert.; N10-006. The Total Course – 4.7 star rating with 5,925 ratings – 15.5 hours.
https://goo.gl/GYAN9j

CompTIA Security+ Certification; SY0-401 – The Total Course 4.6 star rating with 1,425 ratings – 13.5 hours.
https://goo.gl/u94ZjB

 

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #16

What can possibly protect a backup tape that has been stolen from leading to the data on it being accessible?
A: Proper data handling.
B: Proper data storage.
C: Proper data retention.
D: Proper data encryption.

CBK 2: Asset Security
Source: ThorTeaches.com practice tests

Answer


D: Proper encryption can prevent data compromise even if the physical tape is lost. This obviously requires that the encryption is strong enough.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #15

We are implementing database shadowing, how does it help us ensure we can recover from a data loss on our primary systems?
A: It sends transaction logs to a remote location, but not the files themselves. We can rebuild the transactions from the logs.
B: It uses a remote backups service that sends backup files electronically offsite at a certain interval or when the files change.
C: It makes an exact real time copy at another location, this can be another local disk or preferred remote to another type of media.
D: It takes a full backup of our database once a week to tape.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


C: Database shadowing: Exact real time copy of the database or files to another location. It can be another disk in the same server, but best practices dictates another geographical location, often on a different media.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #14

Our IPS lets permitted traffic pass, what is this an example of?
A: True positive.
B: True negative.
C: False positive.
D: False negative.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


A: True Positive: An attack is happening and the system detects it and acts.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #13

When we create an application whitelist we are doing what?
A: Make a list of allowed applications.
B: Making a list of prohibited applications.
C: Making a list of all applications.
D: Making a list of all of our own developed applications.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


A: Application whitelisting: We can whitelist the applications we want to allow to run on our environments, but it can also be compromised. We would whitelist against a trusted digital certificate, a known hash or path and name, the latter is the least secure, an attacker can replace the file at the path with a malicious copy.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #12

Which of these would not have data remanence after the system has been powered off for 10 minutes.
A: Hard disks.
B: Read only memory.
C: Random access memory.
D: Tapes.

CBK 2: Asset Security
Source: ThorTeaches.com practice tests

Answer


C: RAM (Random access memory) would lose its data remanence after a few seconds to a few minutes after the loss of power.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #11

In open source programming we:
A: Release the software, but not the code.
B: Release the code and the software.
C: Release neither the software or code.
D: Release the code, but not the software.

CBK 8: Software Development Security
Source: ThorTeaches.com practice tests

Answer


B: Open source: We release the code publicly, where it can be tested, improved and corrected, but it also allows attackers to find the flaws in the code.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #10

These can all be used in IPSec except which concept?
A: AH.
B: ESP.
C: SA.
D: DR.

CBK 3: Security Engineering
Source: ThorTeaches.com practice tests

Answer


D: IPSEC (Internet Protocol Security): Set of protocols that provide a cryptographic layer to IP traffic (IPv4 and IPv6). It uses AH (Authentication Header) to provide authentication and integrity for each packet. ESP (Encapsulation Security Payload) which provides confidentiality and SA (Security Association) which is a simplex one-way communication (Like a walkie talkie).Can be used to negotiate ESP or AH parameters.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #9

Which type of access control model would we use if integrity is most important?
A: DAC.
B: RBAC.
C: MAC.
D: RUBAC.

CBK 5: Identity and Access Management
Source: ThorTeaches.com practice tests

Answer


B: RBAC (Role Based Access Control): Often used when Integrity is most important. Policy neutral access control mechanism defined around roles and privileges. A role is assigned permissions, and subjects in that role are added to the group, if they move to another position they are moved to the permissions group for that position.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading