BLOGSPOT atas

Wednesday, December 31, 2014

Tuesday, December 30, 2014

Saturday, December 27, 2014

Friday, December 26, 2014

Logo Design Inspiration - 26 Dec 2014



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 276)

(276) Security is a process that is:

A. Continuous
B. Indicative
C. Examined
D. Abnormal

Correct Answer: A

Explanation/Reference:
Explanation:

Security is a continuous process; as such you must closely monitor your systems on a regular basis. Log files are usually a good way to find an indication of abnormal activities. However some care must be exercise as to what will be logged and how the logs are protected. Having corrupted logs is about as good as not having logs at all.

- Muhammad Idham Azhari

Thursday, December 25, 2014

Wednesday, December 24, 2014

Tuesday, December 23, 2014

Saturday, December 20, 2014

Friday, December 19, 2014

Logo Design Inspiration - 19 Dec 2014



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 275)

(275) Network Security is a

A. Product
B. protocols
C. ever evolving process
D. quick-fix solution

Correct Answer: C


Explanation/Reference:

- Muhammad Idham Azhari

Thursday, December 18, 2014

Wednesday, December 17, 2014

Tuesday, December 16, 2014

Saturday, December 13, 2014

Friday, December 12, 2014

Logo Design Inspiration - 12 Dec 2014



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 274)

(274) A significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible. The action does NOT include:

A. Violations of security policy.
B. Attempted violations of security policy.
C. Non-violations of security policy.
D. Attempted violations of allowed actions.

Correct Answer: C


Explanation/Reference:

- Muhammad Idham Azhari

Thursday, December 11, 2014

Wednesday, December 10, 2014

Saturday, December 6, 2014

Friday, December 5, 2014

Logo Design Inspiration - 05 Dec 2014



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 273)

(273) Which of the following embodies all the detailed actions that personnel are required to follow?

A. Standards
B. Guidelines
C. Procedures
D. Baselines

Correct Answer: C


Explanation/Reference:

- Muhammad Idham Azhari

Thursday, December 4, 2014

Wednesday, December 3, 2014

Friday, November 28, 2014

CISSP Exam Preparation (Question 272)

(272) In an organization, an Information Technology security function should:

A. Be a function within the information systems functions of an organization
B. Report directly to a specialized business unit such as legal, corporate security or insurance
C. Be lead by a Chief Security Officer and report directly to the CEO
D. Be independent but report to the Information Systems function

Correct Answer: C


Explanation/Reference:

- Muhammad Idham Azhari

Friday, November 21, 2014

Learn The Programming Language: Python

This infographic gives you the information about one of the popular programming languages.





- Muhammad Idham Azhari

CISSP Exam Preparation (Question 271)

(271) Which of the following choices is NOT part of a security policy?

A. definition of overall steps of information security and the importance of security
B. statement of management intend, supporting the goals and principles of information security
C. definition of general and specific responsibilities for information security management
D. description of specific technologies used in the field of information security

Correct Answer: D


Explanation/Reference:

- Muhammad Idham Azhari

Thursday, November 20, 2014

Learn The Programming Language: JAVA

This infographic gives you the information about one of the popular programming languages.






- Muhammad Idham Azhari