BLOGSPOT atas

Saturday, February 28, 2015

Friday, February 27, 2015

Logo Design Inspiration - 27 Feb 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 285)

(285) Which one of the following is the MOST crucial link in the computer security chain?

A. Access controls
B. People
C. Management
D. Awareness programs

Correct Answer: C


Explanation/Reference:

- Muhammad Idham Azhari

Thursday, February 26, 2015

Wednesday, February 25, 2015

Tuesday, February 24, 2015

Saturday, February 21, 2015

Friday, February 20, 2015

Logo Design Inspiration - 20 Feb 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 284)

(284) The Structures, transmission methods, transport formats, and security measures that are used to provide integrity, availability, and authentication, and confidentiality for transmissions over private and public communications networks and media includes:

A. The Telecommunications and Network Security domain
B. The Telecommunications and Netware Security domain
C. The Technical communications and Network Security domain
D. The Telnet and Security domain

Correct Answer: A

Explanation/Reference:

The Telecommunications, Network, and Internet Security Domain encompasses the structures, transmission methods, transport formats, and security measures used to provide integrity, availability, authentication, and confidentiality for transmissions over private and public communications networks and media." Pg 515 Hansche: Official (ISC)2 Guide to the CISSP Exam

- Muhammad Idham Azhari

Wednesday, February 18, 2015

Tuesday, February 17, 2015

Saturday, February 14, 2015

Friday, February 13, 2015

Logo Design Inspiration - 13 Feb 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 283)

(283) An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of Availability can be defined as:

A. Netware availability
B. Network availability
C. Network acceptability
D. Network accountability

Correct Answer: B


Explanation/Reference:

- Muhammad Idham Azhari

Thursday, February 12, 2015

Wednesday, February 11, 2015

Tuesday, February 10, 2015

Saturday, February 7, 2015

Friday, February 6, 2015

Logo Design Inspiration - 06 Feb 2015



- Muhammad Idham Azhari

People Are The Heart Of Security



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 282)

(282) Which of the following are objectives of an information systems security program?

A. Threats, vulnerabilities, and risks
B. Security, information value, and threats
C. Integrity, confidentiality, and availability.
D. Authenticity, vulnerabilities, and costs.

Correct Answer: C

Explanation/Reference:

There are several small and large objectives of a security program, but the main three principles in all programs are confidentiality, integrity, and availability. These are referred to as the CIA triad. - Shon Harris All-in-one CISSP Certification Guide pg 62

- Muhammad Idham Azhari

Thursday, February 5, 2015

Wednesday, February 4, 2015