Monday 30 September 2019

CISSP Question Answer

Which of the following embodies all the detailed actions that personnel are required to follow?

A. Standards
B. Guidelines
C. Procedures
D. Baselines

Answer: C



A significant action has a state that enables actions on an ADP system to be traced to individuals who may then be held responsible. The action does NOT include:


A. Violations of security policy.
B. Attempted violations of security policy.
C. Non-violations of security policy.
D. Attempted violations of allowed actions.

Answer: D

Thursday 10 January 2019

CISSP Question Answer

Which of the following choices is NOT part of a security policy?

A. definition of overall steps of information security and the importance of security
B. statement of management intend, supporting the goals and principles of information security
C. definition of general and specific responsibilities for information security management
D. description of specific technologies used in the field of information security

Answer: D

In an organization, an Information Technology security function should:


A. Be a function within the information systems functions of an organization
B. Report directly to a specialized business unit such as legal, corporate security or insurance
C. Be lead by a Chief Security Officer and report directly to the CEO
D. Be independent but report to the Information Systems function

Answer: C

Tuesday 11 September 2018

You Can Get 85 Hours Of Cybersecurity Certification Training


The data breaches are at their highest point. Industry giants such as Facebook, Best Buy and FedEx were once considered invulnerable, but in recent years they have revealed that even giants can be harmed. As such, the demand for IT professionals with expertise in cybersecurity, or "white hat / ethical hackers" has grown considerably. IT professionals can take advantage of this lucrative and growing field by obtaining cybersecurity certifications; This Mega Cybersecurity Certification Package contains training courses for three popular certifications.

Before delving into these courses, it is important to understand what a white hat hacker is. These IT professionals specialize in identifying vulnerabilities in networks. Basically, they use the same methods as black hat (malicious) hackers, but they will strengthen or eliminate these vulnerabilities before they can be exploited.

Certs' Cybersecurity Mega Bundle certification focuses on three IT certifications: CISA, CISM and CISSP. These are vendor-independent certifications that support an IT professional's understanding of IT security audits, assurance, guidelines, standards and best practices. These professionals will know how to define, implement and maintain information security in a business environment with approved security standards.

The Certified Information Systems Auditor (CISA) and the Certified Information Systems Manager (CISM) are offered by ISACA, and provide an excellent starting point for IT professionals to learn information security. CISA covers how to audit, govern, implement and support information systems. Meanwhile, CISM is more advanced than CISA; These professionals will know how to adapt information systems to the needs of a company.

This package also contains lessons on the passing of the Certified Information Systems Security Professional exams (CISSP) offered by ISC2. CISSP covers eight domains: security and risk management, asset security, security engineering, communication and network security, identity and access management, security evaluation and testing, security operations and security in software development. You will develop a functional position of all of them in this collection.

Thursday 22 February 2018

CISSP Question Answer

Which one of the following statements describes management controls that are instituted to implement a security policy?

A. They prevent users from accessing any control function.
B. They eliminate the need for most auditing functions.
C. They may be administrative, procedural, or technical.
D. They are generally inexpensive to implement.

Answer: C

Which must bear the primary responsibility for determining the level of protection needed for information systems resources?


A. IS security specialists
B. Senior Management
C. Seniors security analysts
D. system auditors

Answer: B

Wednesday 20 December 2017

CISSP Question Answer

Which one of the following should NOT be contained within a computer policy?

A. Definition of management expectations.
B. Responsibilities of individuals and groups for protected information.
C. Statement of senior executive support.
D. Definition of legal and regulatory controls.

Answer: B


Which one of the following is NOT a fundamental component of a Regulatory Security Policy?

A. What is to be done.
B. When it is to be done.
C. Who is to do it.
D. Why is it to be done

Answer: C

Monday 6 November 2017

CISSP Question Answer

Why must senior management endorse a security policy?

A. So that they will accept ownership for security within the organization.
B. So that employees will follow the policy directives.
C. So that external bodies will recognize the organizations commitment to security.
D. So that they can be held legally accountable.

Answer: A


Which of the following defines the intent of a system security policy?

A. A definition of the particular settings that have been determined to provide optimum security.
B. A brief, high-level statement defining what is and is not permitted during the operation of the system.
C. A definition of those items that must be excluded on the system.
D. A listing of tools and applications that will be used to protect the system.

Answer: A

Monday 11 September 2017

CISSP Question Answer

All of the following are basic components of a security policy EXCEPT the

A. definition of the issue and statement of relevant terms.
B. statement of roles and responsibilities
C. statement of applicability and compliance requirements.
D. statement of performance of characteristics and requirements.

Answer: D


A security policy would include all of the following EXCEPT

A. Background
B. Scope statement
C. Audit requirements
D. Enforcement

Answer: B