RCR 067: CISSP Sample Exam Questions - CISSP Training and Study!

Published: Feb. 8, 2020, 11 p.m.

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will provide CISSP training for  Domain 3 (Engineering Secure Design) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

Question:  084

What is the most commonly used technique to protect against virus attacks?

  1. A) Signature detection
  2. B) Heuristic detection
  3. C) Data integrity assurance
  4. D) Automated reconstruction

Signature detection

Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a system.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Question:  085

In which of the following security modes can you be assured that all users have access permissions for all information processed by the system but will not necessarily need to know of all that information?

  1. A) Dedicated
  2. B) System high
  3. C) Compartmented
  4. D) Multilevel

System high

In system high mode, all users have appropriate clearances and access permissions for all information processed by the system but need to know only some of the information processed by that system.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Question:  086

What is a trusted computing base (TCB)?

  1. A) Hosts on your network that support secure transmissions
  2. B) The operating system kernel and device drivers
  3. C) The combination of hardware, software, and controls that work together to enforce a security policy
  4. D) The software and controls that certify a security policy

The combination of hardware, software, and controls that work together to enforce a security policy

The TCB is the combination of hardware, software, and controls that work together to enforce a security policy.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

 

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

 

LINKS: