Domain 1: Security and Risk Management - Fundamental Principles of Security - Balanced Security
7 important questions on Domain 1: Security and Risk Management - Fundamental Principles of Security - Balanced Security
Through what lens is information security mostly dealt with?
Which assets have critical confidentiality requirements?
Which assets have critical integrity requirements?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
Which assets have critical Availability requirements?
Which 9 controls can be used to keep the availability requirements in place?
2. Clustering
3. Load balancing
4. Redundant data and power lines
5. Software and data backups
6. Disk shadowing
7. Co-location and offsite facilities
8. Rollback functions
9. Failover configurations
Which 6 controls can be used to keep the Integrity requirements in place?
2. Configuration management (system integrity)
3. Change control (process integrity)
4. Access control (physical and technical)
5. Software digital signing
6. Transmission Cyclic Redundancy Check (CRC) functions
Which 3 controls can be used to keep the Confidentiality requirements in place?
2. Encryption for data in transit (IPSec, TLS, PPTP, SSH)
3. Access control (physical and technical)
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding