Preview Mode Links will not work in preview mode

Reduce Cyber Risk Podcast: "CISSP Training Made Simple"


Jan 27, 2020

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will talk about the following items that are included within Domain 2 (Asset Security) of the CISSP Exam.

  • CISSP Article – Best Practices for Data Management
  • CISSP Training –  Determine and maintain information and asset ownership
  • CISSP Exam Questions

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/ 

CISSP Exam Questions

Question:  069

You work as an IT professional for a defense contractor that handles classified military information. Which one of the following data classifications applies to information that could be expected to cause serious damage to national security if disclosed in an unauthorized fashion? 

  1. SBU
  2. Top Secret
  3. Secret
  4. Confidential - Given

Top Secret classification is \"applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security.\" Confidential classification is \"applied to information, the unauthorized disclosure of which reasonably could be expected to cause damage to the national security.\" Sensitive But Unclassified (SBU) information is protected information that does not reach the threshold for classified information

From <https://www.techveze.com/cissp-asset-security/>

------------------------------------

Question:  070

You are using symmetric encryption to protect data stored on a hard drive that will be shipped across the country. What key(s) are involved in the protection of this information? 

  1. Shared secret
  2. Public key 
  3. Public and private keys
  4. Private key

Public keys are used to encrypt information intended for a specific recipient in asymmetric cryptography. They are not used in symmetric cryptography. Private keys are used to decrypt information in asymmetric cryptography. They are not used in symmetric cryptography. Public and private keypairs are used in asymmetric cryptography. They are not used in symmetric cryptography.

From <https://www.techveze.com/cissp-asset-security/>

------------------------------------

Question:  071

Which one of the following is NOT a European Union data handling principle required for participation in the Safe Harbor program? 

  1. Onward Transfer
  2. Choice 
  3. Encryption
  4. Notice

The Notice principle states that organizations must inform individuals about the purpose and scope of data collection efforts. The Choice principle states that organizations must offer individuals the ability to opt out of information collection and storage programs. The Onward Transfer principle states that organizations must only share information with other organizations that comply with the data privacy directive

From <https://www.techveze.com/cissp-asset-security/>

------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS: