Wednesday, December 31, 2014
Tuesday, December 30, 2014
Monday, December 29, 2014
Sunday, December 28, 2014
Saturday, December 27, 2014
Friday, December 26, 2014
CISSP Exam Preparation (Question 276)
(276) Security is a process that is:
A. Continuous
B. Indicative
C. Examined
D. Abnormal
Correct Answer: A
Explanation/Reference:
Explanation:
Security is a continuous process; as such you must
closely monitor your systems on a regular basis. Log files are usually a good
way to find an indication of abnormal activities. However some care must be exercise as to what will
be logged and how the logs are protected. Having corrupted logs is about as
good as not having logs at all.
- Muhammad Idham Azhari
Thursday, December 25, 2014
Wednesday, December 24, 2014
Tuesday, December 23, 2014
Monday, December 22, 2014
Sunday, December 21, 2014
Saturday, December 20, 2014
Friday, December 19, 2014
CISSP Exam Preparation (Question 275)
(275) Network Security is a
A. Product
B. protocols
C. ever evolving process
D. quick-fix solution
Correct Answer: C
Explanation/Reference:
- Muhammad Idham Azhari
Thursday, December 18, 2014
Wednesday, December 17, 2014
Tuesday, December 16, 2014
Monday, December 15, 2014
Sunday, December 14, 2014
Saturday, December 13, 2014
Friday, December 12, 2014
CISSP Exam Preparation (Question 274)
(274) A significant action has a state that enables actions on an
ADP system to be traced to individuals who may then be held responsible. The
action does NOT include:
A. Violations of security policy.
B. Attempted violations of
security policy.
C. Non-violations of security
policy.
D. Attempted violations of
allowed actions.
Correct Answer: C
Explanation/Reference:
- Muhammad Idham Azhari
Thursday, December 11, 2014
Wednesday, December 10, 2014
Tuesday, December 9, 2014
Monday, December 8, 2014
Sunday, December 7, 2014
Saturday, December 6, 2014
Friday, December 5, 2014
CISSP Exam Preparation (Question 273)
(273) Which of the following embodies all the detailed actions that
personnel are required to follow?
A. Standards
B. Guidelines
C. Procedures
D. Baselines
Correct Answer: C
Explanation/Reference:
- Muhammad Idham Azhari
Thursday, December 4, 2014
Wednesday, December 3, 2014
Tuesday, December 2, 2014
Monday, December 1, 2014
Friday, November 28, 2014
CISSP Exam Preparation (Question 272)
(272) In an organization, an Information Technology security
function should:
A. Be a function within the
information systems functions of an organization
B. Report directly to a specialized
business unit such as legal, corporate security or insurance
C. Be lead by a Chief Security
Officer and report directly to the CEO
D. Be independent but report to
the Information Systems function
Correct Answer: C
Explanation/Reference:
- Muhammad Idham Azhari
Wednesday, November 26, 2014
Tuesday, November 25, 2014
Monday, November 24, 2014
Friday, November 21, 2014
Learn The Programming Language: Python
This infographic gives you the information about one of the popular programming languages.
- Muhammad Idham Azhari
- Muhammad Idham Azhari
CISSP Exam Preparation (Question 271)
(271) Which of the following choices is NOT part of a security
policy?
A. definition of overall steps of
information security and the importance of security
B. statement of management
intend, supporting the goals and principles of information security
C. definition of general and
specific responsibilities for information security management
D. description of specific
technologies used in the field of information security
Correct Answer: D
Explanation/Reference:
- Muhammad Idham Azhari
Thursday, November 20, 2014
Learn The Programming Language: JAVA
This infographic gives you the information about one of the popular programming languages.
- Muhammad Idham Azhari
- Muhammad Idham Azhari
Subscribe to:
Posts (Atom)