电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本
换一换
首页 金锄头文库 > 资源分类 > DOC文档下载
分享到微信 分享到微博 分享到QQ空间

Information Security and Risk Management(112)

  • 资源ID:471783709       资源大小:347KB        全文页数:90页
  • 资源格式: DOC        下载积分:20金贝
快捷下载 游客一键下载
账号登录下载
微信登录下载
三方登录下载: 微信开放平台登录   支付宝登录   QQ登录  
二维码
微信扫一扫登录
下载资源需要20金贝
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
支付方式: 支付宝    微信支付   
验证码:   换一换

 
账号:
密码:
验证码:   换一换
  忘记密码?
    
1、金锄头文库是“C2C”交易模式,即卖家上传的文档直接由买家下载,本站只是中间服务平台,本站所有文档下载所得的收益全部归上传人(卖家)所有,作为网络服务商,若您的权利被侵害请及时联系右侧客服;
2、如你看到网页展示的文档有jinchutou.com水印,是因预览和防盗链等技术需要对部份页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有jinchutou.com水印标识,下载后原文更清晰;
3、所有的PPT和DOC文档都被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;下载前须认真查看,确认无误后再购买;
4、文档大部份都是可以预览的,金锄头文库作为内容存储提供商,无法对各卖家所售文档的真实性、完整性、准确性以及专业性等问题提供审核和保证,请慎重购买;
5、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据;
6、如果您还有什么不清楚的或需要我们协助,可以点击右侧栏的客服。
下载须知 | 常见问题汇总

Information Security and Risk Management(112)

Question: 547 | Difficulty: 1/5 | Relevancy: 3/3 Making sure that the data is accessible when and where it is needed is which of the following? confidentiality integrity acceptability ?availability Details Submit a comment on this question Availability is making sure that the data is accessible when and where it is needed.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 59.Contributor: Rakesh SudStudy area: CISSP CBK - Information Security and Risk ManagementCovered topic: Confidentiality, integrity and availability This question ? Copyright 20032009 Rakesh Sud, cccure.org. All rights reserved. No unauthorized use or duplication without explicit written permission of author and of cccure.org.Question: 390 | Difficulty: 3/5 | Relevancy: 3/3 Which of the following is not a goal of integrity? Prevention of the modification of information by unauthorized users. Prevention of the unauthorized or unintentional modification of information by authorized users. Preservation of the internal and external consistency. ?Prevention of the modification of information by authorized users. Details Submit a comment on this question Integrity is addressed through the following three goals: 1. Prevention of the modification of information by unauthorized users.2. Prevention of the unauthorized or unintentional modification of information by authorized users.3. Preservation of the internal and external consistency.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 31.Contributor: Rakesh SudStudy area: CISSP CBK - Information Security and Risk ManagementCovered topic: Confidentiality, integrity and availability This question ? Copyright 20032009 Rakesh Sud, cccure.org. All rights reserved. No unauthorized use or duplication without explicit written permission of author and of cccure.org.Question: 548 | Difficulty: 1/5 | Relevancy: 3/3 Related to information security, availability is the opposite of which of the following? delegation distribution documentation ?destruction Details Submit a comment on this question Availability is the opposite of "destruction."Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 59.Contributor: Rakesh SudStudy area: CISSP CBK - Information Security and Risk ManagementCovered topic: Confidentiality, integrity and availability This question ? Copyright 20032009 Rakesh Sud, cccure.org. All rights reserved. No unauthorized use or duplication without explicit written permission of author and of cccure.org.Question: 1287 | Difficulty: 1/5 | Relevancy: 3/3 What can be described as a measure of the magnitude of loss or impact on the value of an asset? Probability ?Exposure factor Vulnerability Threat Details Submit a comment on this question The exposure factor is a measure of the magnitude of loss or impact on the value of an asset. The probability is the chance or likelihood, in a finite sample, that an event will occur or that a specific loss value may be attained should the event occur. A vulnerability is the absence or weakness of a risk-reducing safeguard. A threat is event, the occurrence of which could have an undesired impact.Source: ROTHKE, Ben, CISSP CBK Review presentation on domain 3, August 1999. Available at http:/www.cccure.org.Thanks to Deepak Seth for reporting a typo within this question. Contributor: Christian VezinaStudy area: CISSP CBK - Information Security and Risk ManagementCovered topic: Risk management This question ? Copyright 20032009 Christian Vezina, cccure.org. All rights reserved. No unauthorized use or duplication without explicit written permission of author and of cccure.org.Question: 843 | Difficulty: 1/5 | Relevancy: 3/3 Making sure that the data has not been changed unintentionally, due to an accident or malice is:?Integrity. Confidentiality. Availability. Auditability. Details Submit a comment on this question Integrity is the correct answer. Integrity refers to the protection of information from unauthorized modification or deletion.Confidentiality is incorrect. Confidentiality refers to the protection of information from unauthorized disclosure.Availability is incorrect. Availability refers to the assurance that information and services will be available to authorized users in accordance with the service level objective.Auditability is incorrect. Auditability refers to the ability to trace an action to the identity that performed it and identify the date and time at which it occurred.ReferencesCBK, pp. 5 - 6AIO3, pp. 56 - 57Last modified 6/2

注意事项

本文(Information Security and Risk Management(112))为本站会员(M****1)主动上传,金锄头文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即阅读金锄头文库的“版权提示”【网址:https://www.jinchutou.com/h-59.html】,按提示上传提交保证函及证明材料,经审查核实后我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.