电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

Information Security and Risk Management(112)

90页
  • 卖家[上传人]:M****1
  • 文档编号:471783709
  • 上传时间:2023-04-02
  • 文档格式:DOC
  • 文档大小:347KB
  • / 90 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 1、Question: 547 | Difficulty: 1/5 | Relevancy: 3/3 Making sure that the data is accessible when and where it is needed is which of the following? confidentiality integrity acceptability ?availability Details Submit a comment on this question Availability is making sure that the data is accessible when and where it is needed.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 59.Contributor: Rakesh SudStudy

      2、 area: CISSP CBK - Information Security and Risk ManagementCovered topic: Confidentiality, integrity and availability This question ? Copyright 20032009 Rakesh Sud, cccure.org. All rights reserved. No unauthorized use or duplication without explicit written permission of author and of cccure.org.Question: 390 | Difficulty: 3/5 | Relevancy: 3/3 Which of the following is not a goal of integrity? Prevention of the modification of information by unauthorized users. Prevention of the unauthorized or

      3、unintentional modification of information by authorized users. Preservation of the internal and external consistency. ?Prevention of the modification of information by authorized users. Details Submit a comment on this question Integrity is addressed through the following three goals: 1. Prevention of the modification of information by unauthorized users.2. Prevention of the unauthorized or unintentional modification of information by authorized users.3. Preservation of the internal and external

      4、 consistency.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 31.Contributor: Rakesh SudStudy area: CISSP CBK - Information Security and Risk ManagementCovered topic: Confidentiality, integrity and availability This question ? Copyright 20032009 Rakesh Sud, cccure.org. All rights reserved. No unauthorized use or duplication without explicit written permission of author and of cccure.org.Question: 548

      5、| Difficulty: 1/5 | Relevancy: 3/3 Related to information security, availability is the opposite of which of the following? delegation distribution documentation ?destruction Details Submit a comment on this question Availability is the opposite of destruction.Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 59.Contributor: Rakesh SudStudy area: CISSP CBK - Information Security and Risk ManagementCove

      6、red topic: Confidentiality, integrity and availability This question ? Copyright 20032009 Rakesh Sud, cccure.org. All rights reserved. No unauthorized use or duplication without explicit written permission of author and of cccure.org.Question: 1287 | Difficulty: 1/5 | Relevancy: 3/3 What can be described as a measure of the magnitude of loss or impact on the value of an asset? Probability ?Exposure factor Vulnerability Threat Details Submit a comment on this question The exposure factor is a mea

      7、sure of the magnitude of loss or impact on the value of an asset. The probability is the chance or likelihood, in a finite sample, that an event will occur or that a specific loss value may be attained should the event occur. A vulnerability is the absence or weakness of a risk-reducing safeguard. A threat is event, the occurrence of which could have an undesired impact.Source: ROTHKE, Ben, CISSP CBK Review presentation on domain 3, August 1999. Available at http:/www.cccure.org.Thanks to Deepak

      8、 Seth for reporting a typo within this question. Contributor: Christian VezinaStudy area: CISSP CBK - Information Security and Risk ManagementCovered topic: Risk management This question ? Copyright 20032009 Christian Vezina, cccure.org. All rights reserved. No unauthorized use or duplication without explicit written permission of author and of cccure.org.Question: 843 | Difficulty: 1/5 | Relevancy: 3/3 Making sure that the data has not been changed unintentionally, due to an accident or malice

      9、is:?Integrity. Confidentiality. Availability. Auditability. Details Submit a comment on this question Integrity is the correct answer. Integrity refers to the protection of information from unauthorized modification or deletion.Confidentiality is incorrect. Confidentiality refers to the protection of information from unauthorized disclosure.Availability is incorrect. Availability refers to the assurance that information and services will be available to authorized users in accordance with the service level objective.Auditability is incorrect. Auditability refers to the ability to trace an action to the identity that performed it and identify the date and time at which it occurred.ReferencesCBK, pp. 5 - 6AIO3, pp. 56 - 57Last modified 6/2

      《Information Security and Risk Management(112)》由会员M****1分享,可在线阅读,更多相关《Information Security and Risk Management(112)》请在金锄头文库上搜索。

      点击阅读更多内容
    最新标签
    监控施工 信息化课堂中的合作学习结业作业七年级语文 发车时刻表 长途客运 入党志愿书填写模板精品 庆祝建党101周年多体裁诗歌朗诵素材汇编10篇唯一微庆祝 智能家居系统本科论文 心得感悟 雁楠中学 20230513224122 2022 公安主题党日 部编版四年级第三单元综合性学习课件 机关事务中心2022年全面依法治区工作总结及来年工作安排 入党积极分子自我推荐 世界水日ppt 关于构建更高水平的全民健身公共服务体系的意见 空气单元分析 哈里德课件 2022年乡村振兴驻村工作计划 空气教材分析 五年级下册科学教材分析 退役军人事务局季度工作总结 集装箱房合同 2021年财务报表 2022年继续教育公需课 2022年公需课 2022年日历每月一张 名词性从句在写作中的应用 局域网技术与局域网组建 施工网格 薪资体系 运维实施方案 硫酸安全技术 柔韧训练 既有居住建筑节能改造技术规程 建筑工地疫情防控 大型工程技术风险 磷酸二氢钾 2022年小学三年级语文下册教学总结例文 少儿美术-小花 2022年环保倡议书模板六篇 2022年监理辞职报告精选 2022年畅想未来记叙文精品 企业信息化建设与管理课程实验指导书范本 草房子读后感-第1篇 小数乘整数教学PPT课件人教版五年级数学上册 2022年教师个人工作计划范本-工作计划 国学小名士经典诵读电视大赛观后感诵读经典传承美德 医疗质量管理制度 2
    关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
    手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
    ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.