Book Image

CISSP in 21 Days

By : M. L. Srinivasan
Book Image

CISSP in 21 Days

By: M. L. Srinivasan

Overview of this book

<p>Certified Information Systems Security Professional (CISSP) is an internationally recognized security qualification. Success in this respected exam opens the door to your dream job as a security expert as well as an eye catching salary. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack in confidence.<br /><br />This book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will help you to enter the exam room with confidence, knowing that you have done all you can to prepare for the big day.<br /><br />This small and concise CISSP exam quick-revision guide provides a disciplined approach to be adopted for reviewing and revising the core concepts a month before the exam. This book provides concise explanation of important concepts in all the 10 domains of the CISSP Common Body of Knowledge (CBK). Each domain is covered in two chapters that are represented as days. Each chapter contains some practice questions.&nbsp; A full-blown mock test is included for practice. This book is not a replacement to full study guides and tries to build on and reemphasize the concepts learned from such guides.</p>
Table of Contents (28 chapters)
CISSP in 21 Days
Credits
About the Author
About the Reviewer
Preface
22
Day 21: Mock Test Paper
23
References

Practice questions


  1. 1. A Trusted Computer System should have ______________.

    a) A well-defined security policy

    b) Accountability

    c) Assurance mechanisms

    d) All the above three

  2. 2. A security label is NOT ______________.

    a) A classification mechanism

    b) A labeling of low, medium, high based on sensitivity

    c) A computer model

    d) Used for defining protection mechanisms

  3. 3. The process of hiding the details, and exposing only the essential features of a particular concept or object that are encapsulated, is known as ___________.

    a) Security domain

    b) Abstraction

    c) Security label

    d) Orange book

  4. 4. During the instruction execution cycle, when many operations are performed through a single instruction, then the mechanism is known as _____________.

    a) Reduced Instruction Set Computing

    b) Complex Instruction Set Computing

    c) Pipelining

    d) Encapsulation

  5. 5. Security ring is a(n) ______________.

    a) Outer ring of a security domain

    b) Inner ring of a security domain

    c) Encryption mechanism

    d) Security domain