RCR 065: How to Pass the CISSP Exam - CISSP Training and Study

Published: Feb. 3, 2020, 11 p.m.

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will provide CISSP training for  Domain 3 (Engineering Secure Design) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/ 

CISSP Exam Questions

Question:  078

Which database security risk occurs when data from a higher classification level is mixed with data from a lower classification level?

  1. A) Aggregation
  2. B) Inference
  3. C) Contamination
  4. D) Polyinstantiation

Contamination

Contamination is the mixing of data from a higher classification level and/or need-to-know requirement with data from a lower classification level and/or need-to-know requirement.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Question:  079

How many major categories do the TCSEC criteria define?

  1. A) Two
  2. B) Three
  3. C) Four
  4. D) Five

Four

TCSEC defines four major categories: category A is verified protection, category B is mandatory protection, category C is discretionary protection, and category D is minimal protection.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Question:  080

Which Bell-LaPadula property keeps lower-level subjects from accessing objects with a higher security level?

  1. A) (star) Security Property
  2. B) No write up property
  3. C) No read up property
  4. D) No read down property

No read up property

The no read up the property, also called the Simple Security Policy, prohibits subjects from reading a higher security level object.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS: