Saturday, January 31, 2015
Friday, January 30, 2015
CISSP Exam Preparation (Question 281)
(281) Most computer attacks result in violation of which of the
following security properties?
A. Availability
B. Confidentiality
C. Integrity and control
D. All of the choices.
Correct Answer: D
Explanation/Reference:
Explanation:
Most computer attacks only corrupt a system's
security in very specific ways. For example, certain attacks may enable a
hacker to read specific files but don't allow alteration of any system
components. Another attack may allow a hacker to shut down certain system
components but doesn't allow access to any files. Despite the varied
capabilities of computer attacks, they usually result in violation of only four
different security properties: availability, confidentiality, integrity, and
control.
- Muhammad Idham Azhari
Thursday, January 29, 2015
Wednesday, January 28, 2015
Tuesday, January 27, 2015
Monday, January 26, 2015
Sunday, January 25, 2015
Saturday, January 24, 2015
Friday, January 23, 2015
CISSP Exam Preparation (Question 280)
(280) Which of the following describes elements that create
reliability and stability in networks and systems and which assures that
connectivity is accessible when needed?
A. Availability
B. Acceptability
C. Confidentiality
D. Integrity
Correct Answer: A
Explanation/Reference:
- Muhammad Idham Azhari
Thursday, January 22, 2015
Wednesday, January 21, 2015
Tuesday, January 20, 2015
Monday, January 19, 2015
Sunday, January 18, 2015
Saturday, January 17, 2015
Friday, January 16, 2015
CISSP Exam Preparation (Question 279)
(279) Making sure that the data is accessible when and where it is
needed is which of the following?
A. Confidentiality
B. integrity
C. acceptability
D. availability
Correct Answer: D
Explanation/Reference:
- Muhammad Idham Azhari
Thursday, January 15, 2015
Wednesday, January 14, 2015
Tuesday, January 13, 2015
Monday, January 12, 2015
Sunday, January 11, 2015
Saturday, January 10, 2015
Friday, January 9, 2015
CISSP Exam Preparation (Question 278)
(278) Which of the following prevents, detects, and corrects errors
so that the integrity, availability, and confidentiality of transactions over
networks may be maintained?
A. Communications security
management and techniques
B. Networks security management
and techniques
C. Clients security management
and techniques
D. Servers security management
and techniques
Correct Answer: A
Explanation/Reference:
- Muhammad Idham Azhari
Thursday, January 8, 2015
Wednesday, January 7, 2015
Tuesday, January 6, 2015
Monday, January 5, 2015
Sunday, January 4, 2015
Saturday, January 3, 2015
Friday, January 2, 2015
CISSP Exam Preparation (Question 277)
(277) What are the three fundamental principles of security?
A. Accountability,
confidentiality, and integrity
B. Confidentiality, integrity,
and availability
C. Integrity, availability, and
accountability
D. Availability, accountability,
and confidentiality
Correct Answer: B
Explanation/Reference:
- Muhammad Idham Azhari
Thursday, January 1, 2015
Subscribe to:
Posts (Atom)