BLOGSPOT atas

Friday, March 27, 2015

Logo Design Inspiration - 27 Mar 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 289)

(289) Within the organizational environment, the security function should report to an organizational level that

A. Has information technology oversight.
B. Has autonomy from other levels.
C. Is an external operation.
D. Provides the internal audit function.

Correct Answer: B


Explanation/Reference:

- Muhammad Idham Azhari

Friday, March 20, 2015

Logo Design Inspiration - 20 Mar 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 288)

(288) Organizations develop change control procedures to ensure that

A. All changes are authorized, tested, and recorded.
B. Changes are controlled by the Policy Control Board (PCB).
C. All changes are requested, scheduled, and completed on time.
D. Management is advised of changes made to systems.

Correct Answer: A

Explanation/Reference:

"Change Control: Changes must be authorized, tested, and recorded. Changed systems may require recertificationvand re-accreditation." Pg 699 Shon Harris: All-in-One CISSP Certification

- Muhammad Idham Azhari

Friday, March 13, 2015

Logo Design Inspiration - 13 Mar 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 287)

(287) Information security is the protection of data. Information will be protected mainly based on:

A. Its sensitivity to the company.
B. Its confidentiality.
C. Its value.
D. All of the choices.

Correct Answer: D

Explanation/Reference:

Information security is the protection of data against accidental or malicious disclosure, modification, or destruction. Information will be protected based on its value, confidentiality, and/or sensitivity to the company, and the risk of loss or compromise. At a minimum, information will be update-protected so that only authorized individuals can modify or erase the information.

- Muhammad Idham Azhari

Friday, March 6, 2015

Logo Design Inspiration - 06 Mar 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 286)

(286) The security planning process must define how security will be managed, who will be responsible, and

A. Who practices are reasonable and prudent for the enterprise.
B. Who will work in the security department.
C. What impact security will have on the intrinsic value of data.
D. How security measures will be tested for effectiveness.

Correct Answer: D


Explanation/Reference:

- Muhammad Idham Azhari