BLOGSPOT atas

Friday, May 29, 2015

Logo Design Inspiration - 29 May 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 298)

(298) Which one of the following is not one of the outcomes of a vulnerability analysis?

A. Quantative loss assessment
B. Qualitative loss assessment
C. Formal approval of BCP scope and initiation document
D. Defining critical support areas

Correct Answer: C


Explanation/Reference:

- Muhammad Idham Azhari

Friday, May 22, 2015

Logo Design Inspiration - 22 May 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 297)

(297) Risk analysis is MOST useful when applied during which phase of the system development process?

A. Project identification
B. Requirements definition
C. System construction
D. Implementation planning

Correct Answer: A

Explanation/Reference:

Reference: pg 684 Shon Harris: All-in-One CISSP Certification

- Muhammad Idham Azhari

Friday, May 15, 2015

Logo Design Inspiration - 15 May 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 296)

(296) Which of the following is not a compensating measure for access violations?

A. Backups
B. Business continuity planning
C. Insurance
D. Security awareness

Correct Answer: D


Explanation/Reference:

- Muhammad Idham Azhari

Friday, May 8, 2015

Logo Design Inspiration - 08 May 2015



- Muhammad Idham Azhari

CISSP Exam Preparation (Question 295)

(295) Which of the following best explains why computerized information systems frequently fail to meet the needs of users?

A. Inadequate quality assurance (QA) tools
B. Constantly changing user needs
C. Inadequate user participation in defining the system's requirements
D. Inadequate project management.

Correct Answer: C


Explanation/Reference:

- Muhammad Idham Azhari