BLOGSPOT atas

Saturday, January 31, 2015

Friday, January 30, 2015

Logo Design Inspiration - 30 Jan 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 281)

(281) Most computer attacks result in violation of which of the following security properties?

A. Availability
B. Confidentiality
C. Integrity and control
D. All of the choices.

Correct Answer: D

Explanation/Reference:
Explanation:

Most computer attacks only corrupt a system's security in very specific ways. For example, certain attacks may enable a hacker to read specific files but don't allow alteration of any system components. Another attack may allow a hacker to shut down certain system components but doesn't allow access to any files. Despite the varied capabilities of computer attacks, they usually result in violation of only four different security properties: availability, confidentiality, integrity, and control.

- Muhammad Idham Azhari

Thursday, January 29, 2015

Wednesday, January 28, 2015

Saturday, January 24, 2015

Friday, January 23, 2015

Logo Design Inspiration - 23 Jan 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 280)

(280) Which of the following describes elements that create reliability and stability in networks and systems and which assures that connectivity is accessible when needed?

A. Availability
B. Acceptability
C. Confidentiality
D. Integrity

Correct Answer: A


Explanation/Reference:

- Muhammad Idham Azhari

Thursday, January 22, 2015

Wednesday, January 21, 2015

Saturday, January 17, 2015

Friday, January 16, 2015

Logo Design Inspiration - 16 Jan 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 279)

(279) Making sure that the data is accessible when and where it is needed is which of the following?

A. Confidentiality
B. integrity
C. acceptability
D. availability

Correct Answer: D


Explanation/Reference:

- Muhammad Idham Azhari

Thursday, January 15, 2015

Wednesday, January 14, 2015

Saturday, January 10, 2015

Friday, January 9, 2015

Logo Design Inspiration - 09 Jan 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 278)

(278) Which of the following prevents, detects, and corrects errors so that the integrity, availability, and confidentiality of transactions over networks may be maintained?

A. Communications security management and techniques
B. Networks security management and techniques
C. Clients security management and techniques
D. Servers security management and techniques

Correct Answer: A


Explanation/Reference:

- Muhammad Idham Azhari

Wednesday, January 7, 2015

Friday, January 2, 2015

Logo Design Inspiration - 02 Jan 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 277)

(277) What are the three fundamental principles of security?

A. Accountability, confidentiality, and integrity
B. Confidentiality, integrity, and availability
C. Integrity, availability, and accountability
D. Availability, accountability, and confidentiality

Correct Answer: B


Explanation/Reference:

- Muhammad Idham Azhari