RCR 066: Instrumental CISSP Exam Questions to Pass - CISSP Training and Study!

Jan 29, 2020
CISSP Cyber Training
RCR 066: Instrumental CISSP Exam Questions to Pass - CISSP Training and Study!
5:07
 

 

Description:

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

 In this episode, Shon will provide CISSP training for  Domain 3 (Engineering Secure Design) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

 BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

 Question:  081

Which one of the following storage devices is most likely to require encryption technology in order to maintain data security in a networked environment?

  1. A) Hard disk
  2. B) Backup tape
  3. C) Removable drives
  4. D) RAM

 Removable drives

 Removable drives are easily taken out of their authorized physical location, and it is often not possible to apply operating system access controls to them. Therefore, encryption is often the only security measure short of physical security that can be afforded to them. Backup tapes are most often well controlled through physical security measures. Hard disks and RAM chips are often secured through operating system access controls.

 Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

 ------------------------------------

 Question:  082

What advanced virus technique modifies the malicious code of a virus on each system it infects?

  1. A) Polymorphism
  2. B) Stealth
  3. C) Encryption
  4. D) Multipartitism

 Polymorphism

 In an attempt to avoid detection by signature-based antivirus software packages, polymorphic viruses modify their own code each time they infect a system.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

 ------------------------------------

 Question:  083

Which one of the following types of memory might retain information after being removed from a computer and, therefore, represent a security risk?

  1. A) Static RAM
  2. B) Dynamic RAM
  3. C) Secondary memory
  4. D) Real memory

 Secondary memory

 Secondary memory is a term used to describe magnetic and optical media. These devices will retain their contents after being removed from the computer and may later be read by another user.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

 ------------------------------------

 Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

 LINKS: 

TRANSCRIPT: 

  podcast episode 66 sample 10 questions welcome to reduce cyber risk podcast where we provide you the training and tools you need to pass the cissp exam while enhancing your cybersecurity career hi my name is Sean Gerber and I'm your host for this action-packed informative podcast join me each week is I provide the information you need to grow your cybersecurity knowledge so that you're better prepared to pass the cissp exam hey all is Sean Gerber at reduce cyber risk podcast and a Shawn gerber.com hope everybody's doing well today and today we're going to throw out a few cissp exam questions so exam questions for today which of the following storage devices is most likely to require encryption technology in order to maintain data security in a networked environment of the following storage devices is most likely to require encryption technology in order to maintain data security in a network environment a hard disk be backup tape C removable drives or D Ram which of the following devices is most likely require encryption technology in order to maintain data security in a networked environment answer is C removable drives they are easily taken out on when they're not an authorized locations and it is often possible to apply operating system access controls to them that you need to protect your removable drive very very important because they haven't let Tennessee to get legs and walk off okay that's from brainscape what's the best virus technique modifies the malicious code of a virus on each system index a polymorphism how big can Delaware's be stealth ordi multi-partisan what the best virus techniques modifies malicious code of virus on each system it affects morphism stealth encryption or multipartism orphic rotavirus and answer is polymorphism a it's an attempt to avoid detection been signature-based antivirus software packages will morph and they will try to do their own thing too so they can get around it and they said they modify their own Cody's time that they infected systems at the polymorphism next question in which of the following types of memory might retain information after being removed from a computer and therefore represent a security risk a static Ram B dynamic Ram secondary memory real memory again which of the following types of memory might retain information after being removed from a computer and therefore represent a security risk a static Ram be dynamic Ram sea secondary memory or D real memory what is it it is secondary memory C is a term used to describe magnetic and Optical media devices will retain their contents after being removed from the computer and later will be read by another user and I've done that before in my life when I was a hacker we would do that would actually be able to read data for a while so all right I hope you all enjoy these a cissp exam questions you know you can check them out at Shawn gerber.com at s h o n g e r b e r. Com you can check out AP exam questions that are available for you all you got to do is sign up for my email subscriber list also you can get a cissp mini-course domains 1 through 8 for free spell as you can purchase my also my all eight domains of my cissp training like 24 hours of video all of that you can get at Shaw dot-com all right I hope you have a wonderful day and we'll catch you on the flip side see you joining me today on my podcast head over to Shawn gerber.com and look at all the free content that I have available for you there is a cissp mini course free cissp exam questions podcast and so much more it's all available to my email subscriber so sign up if you want my personalized cissp training purchase my training courses and I'll be there to help you with your cissp need so you can pass the test the first time thanks so much for listening will catch you on the flip side

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras sed sapien quam. Sed dapibus est id enim facilisis, at posuere turpis adipiscing. Quisque sit amet dui dui.
Call To Action

Stay connected with news and updates!

Join our mailing list to receive the latest news and updates from our team.
Don't worry, your information will not be shared.

We hate SPAM. We will never sell your information, for any reason.