Cissp domain 2 - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Cissp domain 2? On this page you'll find 80 study documents about Cissp domain 2.
Page 4 out of 80 results
Sort by
-
CISSP Domain 2 VERIFIED Questions& Answers 2024
- Exam (elaborations) • 7 pages • 2024
-
- $8.49
- + learn more
Categorization - The process of determining the impact of the loss of confidentiality, 
integrity, or availability of the information to an organization 
Clearing - The removal of sensitive data from storage devices in such a way that there is 
assurance that the data may not be reconstructed using normal system functions of software 
file/data recovery utilities 
Curie Temperature - The critical point where a material's intrinsic magnetic alignment 
changes direction 
Data Classification -...
-
WGU C725 CISSP Study Guide 8th Edition Quizzes with Correct Answers and the Rationale 1. What is the most commonly used technique to protect against virus attacks? A Signature detection B Automated reconstruction C Data integrity assurance D Heuristic d
- Exam (elaborations) • 26 pages • 2023
- Available in package deal
-
- $18.99
- + learn more
WGU C725 CISSP Study Guide 8th 
Edition Quizzes with Correct Answers 
and the Rationale 
1. What is the most commonly used technique to protect against virus attacks? 
A Signature detection 
B Automated reconstruction 
C Data integrity assurance 
D Heuristic detection --------- CORRECT ANSWER ----- Signature Detection 
Signature detection mechanisms use known descriptions of viruses to identify malicious 
code resident on a system. 
Domain 3: Security Architecture and Engineering 
3.5 Assess ...
-
CISSP Official ISC2 practice tests - Domain 3
- Exam (elaborations) • 25 pages • 2023
-
Available in package deal
-
- $12.49
- + learn more
1. Matthew is the security administrator for a consulting firm and must enforce access controls that restrict users' access based upon their previous activity. For example, once a consultant accesses data belonging to Acme Cola, a consulting client, they may no longer access data belonging to any of Acme's competitors. What security model best fits Matthew's needs? 
 
A. Clark-Wilson 
B. Biba 
C. Bell-LaPadula 
D. Brewer-Nash - Answer- D. The Brewer-Nash model allows access controls to change...
-
CISSP Official ISC2 practice tests - Domain 2
- Exam (elaborations) • 31 pages • 2023
-
Available in package deal
-
- $12.49
- + learn more
1. Angela is an information security architect at a bank and has been assigned to ensure that transactions are secure as they traverse the network. She recommends that all transactions use TLS. What threat is she most likely attempting to stop, and what method is she using to protect against it? 
 
A. Man-in-the-middle, VPN 
B. Packet injection, encryption 
C. Sniffing, encryption 
D. Sniffing, TEMPEST - Answer- C. Encryption is often used to protect traffic like bank transactions from sniffing....
-
CISSP Official ISC2 practice tests - Domain 1
- Exam (elaborations) • 29 pages • 2023
-
Available in package deal
-
- $12.49
- + learn more
1. What is the final step of a quantitative risk analysis? 
 
A. Determine asset value. 
B. Assess the annualized rate of occurrence. 
C. Derive the annualized loss expectancy. 
D. Conduct a it analysis. - Answer- D. 
The final step of a quantitative risk analysis is conducting a cost/benefit analysis to 
determine whether the organisation should implement proposed countermeasure(s). 
 
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorised network is an example of what cat...
As you read this, a fellow student has made another $4.70
-
CISSP PRACTICE TESTS Chapter 1▪Security & Risk Management (Domain 1) 100 Q&A Verified Solution
- Exam (elaborations) • 19 pages • 2023
-
- $14.47
- + learn more
CISSP PRACTICE TESTS Chapter 1▪Security & Risk Management (Domain 1) 100 Q&A 
1. What is the final step of quantitative? 
A. Determine asset value. 
B.Assess the annualized rate of occurrence. 
C. Derive the annualized loss expectancy. 
D. Conduct a cost/benefit analysis. 
D. Conduct a cost/benefit analysis. 
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? 
A. Spoofing 
B. Information disclosure 
C. Repudiation 
D. ...
-
WGU C725 Master's Course Information Security and Assurance: Final Exam Questions and Answers Latest Update 2023-2024
- Exam (elaborations) • 49 pages • 2023
-
Available in package deal
-
- $17.99
- + learn more
WGU C725 Master's Course Information Security and Assurance: Final Exam Questions and Answers Latest Update . Which two secure methods should be used to keep track of passwords? 
A. Encrypt text files of them on the user's workstation 
B. Store them on a sticky note in a convenient spot 
C. Share them with a trusted manager or coworker 
D. Organization-approved password storage software - answer-AD 
Which groups typically report to the chief security officer (CSO)? 
A. Security engineering and...
-
CISSP PRACTICE TESTS Chapter 1▪Security & Risk Management (Domain 1) 100 Q&A
- Exam (elaborations) • 19 pages • 2024
-
- $13.49
- + learn more
CISSP PRACTICE TESTS Chapter 1▪Security & Risk Management (Domain 1) 100 Q&A 
1. What is the final step of quantitative? 
A. Determine asset value. 
B.Assess the annualized rate of occurrence. 
C. Derive the annualized loss expectancy. 
D. Conduct a cost/benefit analysis. 
D. Conduct a cost/benefit analysis. 
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? 
A. Spoofing 
B. Information disclosure 
C. Repudiation 
D. ...
-
CISSP Exam Collection - Part 2 (Questions with Correct Answers A+ Graded 100% Verified)
- Exam (elaborations) • 126 pages • 2023
-
- $11.69
- + learn more
CISSP Exam Collection - Part 2 (Questions with Correct Answers A+ Graded 100% Verified) 
 
 
 
QUESTION 151 
 
Which of the following biometric parameters are better suited for authentication use over a long period of time? 
 
A. Iris pattern 
B. Voice pattern 
C. Signature dynamics 
D. Retina pattern CORRECT ANSWER: Correct Answer: A 
Section: Identity and Access Management 
Explanation 
Explanation/Reference: 
The iris pattern is considered lifelong. Unique features of the iris are: freckles,...
-
CISSP Domain 1 a questions and answers certified 2024
- Exam (elaborations) • 4 pages • 2024
- Available in package deal
-
- $13.49
- + learn more
CISSP Domain 1 a questions and answers certified 2024
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia