Book Image

CISSP in 21 Days - Second Edition

By : M. L. Srinivasan, None M.L.Srinivasan
Book Image

CISSP in 21 Days - Second Edition

By: M. L. Srinivasan, None M.L.Srinivasan

Overview of this book

Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence. This simple yet informative book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will build your confidence and enable you to crack the Gold Standard exam, knowing that you have done all you can to prepare for the big day. This book provides concise explanations of important concepts in all 10 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods. A complete mock test is included at the end to evaluate whether you're ready for the exam. This book is not a replacement for full study guides; instead, it builds on and reemphasizes concepts learned from them.
Table of Contents (27 chapters)
CISSP in 21 Days Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Sample questions


Q1. Spoofing is a type of:

  1. Vulnerability

  2. Masquerading

  3. Protocol

  4. Layer in a TCP/IP model

Q2. An attack is a:

  1. Threat

  2. Vulnerability

  3. Technique

  4. Protocol

Q3. Transport layer security and secure sockets layer are not:

  1. Protocols

  2. Cryptographic algorithms

  3. Vulnerabilities

  4. Use encryption

Q4. Replay attacks are used to:

  1. Gain unauthorized access to the application systems

  2. Resolve domain names

  3. Break cryptographic keys

  4. Setup secure connections

Q5. Internet Protocol (IP) operates in:

  1. Physical layer

  2. Network layer

  3. Application layer

  4. Communication layer

Q6. Border Gateway Protocol is a:

  1. Physical layer protocol

  2. Address Resolution Protocol

  3. Routing Protocol

  4. LAN technology

Q7. Multi Protocol Label Switching (MPLS) is often referred to as:

  1. Application Layer Protocol

  2. Layer 2.5 protocol

  3. Layer 3 protocol

  4. Layer 3.5 protocol

Q8. IPsec is a set of protocols that are used to secure Internet communications. Which of the following is not a key function of the protocol?

  1. Authentication

  2. Encryption

  3. Key exchange

  4. Key modification