100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
OFFICIAL (ISC)² CISSP - DOMAIN 3: SECURITY ENGINEERING QUESTIONS AND ANSWERS WITH SOLUTIONS 2024 $17.49   Add to cart

Exam (elaborations)

OFFICIAL (ISC)² CISSP - DOMAIN 3: SECURITY ENGINEERING QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

 2 views  0 purchase
  • Course
  • CISSP
  • Institution
  • CISSP

OFFICIAL (ISC)² CISSP - DOMAIN 3: SECURITY ENGINEERING QUESTIONS AND ANSWERS WITH SOLUTIONS 2024

Preview 2 out of 7  pages

  • August 17, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISSP
  • CISSP
avatar-seller
Performance
OFFICIAL (ISC)² CISSP - DOMAIN 3:
SECURITY ENGINEERING QUESTIONS
AND ANSWERS WITH SOLUTIONS 2024
Abstraction - ANSWER Involves the removal of characteristics from an entity in order to easily represent
its essential properties.



Access Control Matrix - ANSWER A two-dimensional table that allows for individual subjects and objects
to be related to each other.



Asymmetric Algorithms - ANSWER One-way functions, that is, a process that is much simpler to go in one
direction (forward) than to go in the other direction (backward or reverse engineering).



Address Space Layout Randomization (ASLR) - ANSWER Involves randomly arranging the positions of key
data areas of a program, including the base of the executable and the positions of the stack, heap, and
libraries in a process's memory address space.



Aggregation - ANSWER Combining non-sensitive data from separate sources to create sensitive
information.



Algorithm - ANSWER A mathematical function that is used in the encryption and decryption processes.



Bell-La Padula Model - ANSWER Explores the rules that would have to be in place if a subject is granted a
certain level of clearance and a particular mode of access.



Brewer-Nash (The Chinese Wall) Model - ANSWER This model focuses on preventing conflict of interest
when a given subject has access to objects with sensitive information associated with two competing
parties.



Cable Plant Management - ANSWER The design, documentation, and management of the lowest layer of
the OSI network model - the physical layer.

, Certificate Authority (CA) - ANSWER An entity trusted by one or more users as an authority in a network
that issues, revokes, and manages digital certificates.



Ciphertext or Cryptogram - ANSWER The altered form of a plaintext message, so as to be unreadable for
anyone except the intended recipients.



Cloud Computing - ANSWER A model for enabling ubiquitous, convenient, on-demand network access to
a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management.



Common Criteria - ANSWER Provides a structured methodology for documenting security requirements,
documenting and validating security capabilities, and promoting international cooperation in the area of
IT security.



Community Cloud Infrastructure - ANSWER Provisioned for exclusive use by a specific community of
consumers from organizations that have shared concerns.



Confusion - ANSWER Provided by mixing (changing) the key values used during the repeated rounds of
encryption. When the key is modified for each round, it provides added complexity that the attacker
would encounter.



Control Objects for Information and Related Technology (COBIT) - ANSWER Provides a set of generally
accepted processes to assist in maximizing the benefits derived using information technology (IT) and
developing appropriate IT governance.



Covert Channels - ANSWER Communications mechanisms hidden from the access control and standard
monitoring systems of an information system.



Cryptanalysis - ANSWER The study of techniques for attempting to defeat cryptographic techniques and,
more generally, information security services.



Cryptology - ANSWER The science that deals with hidden, disguised, or encrypted communications. It
embraces communications security and communications intelligence.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Performance. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.49
  • (0)
  Add to cart