CISSP: Certified Information Systems Security Professional by Ed Tittel

By Ed Tittel

This 3rd variation of Sybex's in-depth examine advisor to the "must have" overseas safeguard certification, CISSP, presents up to date insurance of the most recent defense applied sciences and practices. With extra exam-related content material and a complete new Bonus examination, this new version good points extended insurance of key themes akin to biometrics, auditing and responsibility, and software program safeguard try. Written via IT safeguard specialists with years of real-world safeguard adventure, this ebook is helping IT safety pros seize the entire legit examination domain names. The significant other CD comprises complicated trying out engine with hundreds and hundreds of pattern examination questions, digital flashcards, and the whole publication in PDF.

Show description

Read Online or Download CISSP: Certified Information Systems Security Professional Study Guide PDF

Similar comptia books

Privacy Protection and Computer Forensics(Artech House Computer Security Series)

This revised variation of an Artech condominium bestseller is going some distance past the common desktop forensics books out there, emphasizing tips to defend one's privateness from facts robbery and adversarial desktop forensics. the second one variation has been up to date to provide extra specified how-to assistance on conserving the confidentiality of knowledge kept on desktops, and particular details at the vulnerabilities of established ancillary computing units, comparable to PDAs, mobile phones, clever playing cards, GPS units, cellphone calling playing cards, fax machines, and photocopiers.

Security in RFID and Sensor Networks

Long ago numerous years, there was an expanding development within the use of Radio Frequency identity (RFID) and instant Sensor Networks (WSNs) in addition to within the integration of either platforms because of their complementary nature, versatile mix, and the call for for ubiquitous computing. As regularly, enough protection continues to be one of many open parts of shock earlier than large deployment of RFID and WSNs could be completed.

Foundations of Security Analysis and Design II

Safeguard is a quickly starting to be zone of laptop technology, with direct and lengthening relevance to real-life purposes, equivalent to web transactions, e-commerce, info safeguard, community and platforms safety, and so forth. Foundations for the research and layout of security measures of such functions are badly wanted that allows you to validate and end up their correctness.

Network Security Policies and Procedures (Advances in Information Security)

Corporation community directors are pressured this present day to aggressively pursue a strong community defense regime. This ebook goals to provide the reader a robust, multi-disciplinary knowing of the way to pursue this target. This expert quantity introduces the technical matters surrounding safeguard in addition to how safety regulations are formulated on the govt point and communicated through the association.

Additional resources for CISSP: Certified Information Systems Security Professional Study Guide

Example text

Electronic Communications Privacy Act B. Gramm-Leach-Bliley Act C. USA Patriot Act D. Privacy Act of 1974 Assessment Test xxxv 24. What type of detected incident allows the most time for an investigation? A. Compromise B. Denial of service C. Malicious code D. Scanning 25. Auditing is a required factor to sustain and enforce what? A. Accountability B. Confidentiality C. Accessibility D. Redundancy 26. Which type of firewall automatically adjusts its filtering rules based on the content of the traffic of existing sessions?

4- to 5-feet high concrete 8. A VPN can be established over which of the following? A. Wireless LAN connection B. Remote access dial-up connection C. WAN link D. All of the above 9. What is the Biba access control model primarily based upon? A. Identity B. Analog C. Military D. Lattice 10. Which one of the following database backup techniques requires the greatest expenditure of funds? A. Transaction logging B. Remote journaling C. Electronic vaulting D. Remote mirroring 11. What is the value of the logical operation shown here?

Transaction logging B. Remote journaling C. Electronic vaulting D. Remote mirroring 11. What is the value of the logical operation shown here? X: 0 1 1 0 1 0 Y: 0 0 1 1 0 1 ___________________________ X ∨ Y: ? A. 0 1 1 1 1 1 B. 0 1 1 0 1 0 C. 0 0 1 0 0 0 D. 0 0 1 1 0 1 Assessment Test xxxiii 12. Which one of the following security modes does not require that a user have a valid security clearance for all information processed by the system? A. Dedicated mode B. System high mode C. Compartmented mode D.

Download PDF sample

Rated 4.70 of 5 – based on 27 votes