• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CISSP Exam Cram Latest Updated -

Exam (elaborations) Dec 14, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

CISSP Exam Cram Latest Updated - Actual Exam 1000 Questions and 100% Verified Correct Answers Guaranteed A+

Annual Loss Expectancy - CORRECT ANSWER: ALE = SLE x ARO

Annual Rate of Occurrence - CORRECT ANSWER: How many times does this happen

annually?

ATO - CORRECT ANSWER: Authorization to Operate is a formal statement that

authorizes operation and agrees to accept any and all risks

BS 31100 - CORRECT ANSWER: Provides guidance on objectives, mandate and

commitment to manage risk

Class A FIre Extinguisher - CORRECT ANSWER: Ideal for paper, wood fires should be suppressed with water or soda acid

Class B Fire Extinguisher - CORRECT ANSWER: For Gasoline/Oil fires use CO2, soda acid or halon

Class C Fire Extinguisher - CORRECT ANSWER: For Electronics fires, suppressed with CO2 or halon replacement

Class D Fire Extinguisher - CORRECT ANSWER: For combustible metals, suppressed

with dry powder

Class K Fire Extinguisher - CORRECT ANSWER: For kitchen fires, use saponifying

agents that blanket the fire

COBIT - CORRECT ANSWER: is a framework to help provide governance and

assurance.

Components of Take-Grant model - CORRECT ANSWER: Confidentiality-based model

that supports: take, grant, create, revoke

Copyright - CORRECT ANSWER: A legal device that provides creator the right to

control how the work is used. For Life plus 70 years

CPTED - CORRECT ANSWER: is Crime Prevention Through Environmental Design

(CPTED). The benefits of CPTED include the following: Natural access control Natural surveillance Territorial reinforcement. The effect of CPTED is that it causes the criminal to feel an increase in the threat of being discovered and provides natural surveillance that can serve as a physical deterrent control. 1 / 4

Data Mining - CORRECT ANSWER: The process of analyzing data to find and

understand patterns and relationships about the data.

Data Warehouse - CORRECT ANSWER: A database that contains data from many

other databases. This allows for trend analysis and marketing decisions through data analytics

DCMA - CORRECT ANSWER: Digital Millenium Copyright Act makes it a crime to

bypass anti-piracy controls on software

Due Care - CORRECT ANSWER: Taking reasonable care to protect the assets of an

organization

Due Dilligence - CORRECT ANSWER: Doing the right thing over a period of time

End-to-End Encryption - CORRECT ANSWER: Generally performed by the end user

and as such can pass through each node without further processing. However, source and destination addresses are passed in clear text, so they can be seen to someone sniffing traffic.

FISMA - CORRECT ANSWER: Federal Info Security Management Act brought about a

set of clear guidelines for Info Security designed for protection of government IT and data

GLBA - CORRECT ANSWER: Gramm-Leach-Bliley Act resulted in the most sweeping

overhaul of financial services regulation in the United States.

How does PGP differ from PKI - CORRECT ANSWER: It does use a CA, but builds a

web of trust that develops as users sign and issues their own keys

How does S/MIME work - CORRECT ANSWER: Adds two valuable components to

email: digital signatures and public key encryption, it supports X.509 certs and RSA encryption

How the PERT weighted average is calculated - CORRECT ANSWER: PERT Weighted

Average = Optimistic Time +4 x Most Likely Time + Pessimistic Time/6

How to calculate Controls Gap - CORRECT ANSWER: ALE before Control - ALE after

Control

How to calculate Residual Risk - CORRECT ANSWER: (Threats x Vulnerability x Asset Value) x Controls Gap

  • / 4

Interoperability Agreement - CORRECT ANSWER: An IA is a document that specifies

any and all requirements for creating and maintaining requirements for companies to exchange data (like between airlines)

ISA - CORRECT ANSWER: Interconnection Security Agreement is a document that

specifies the requirements for establishing, maintaining, and operating an interconnection between systems or networks

ISO 27001 - CORRECT ANSWER: This standard describes requirements on how to

establish, implement, operate, monitor, review, and maintain an information security management system (ISMS); it is based on British Standard 7799.

ISO 27002 - CORRECT ANSWER: This standard is considered a code of practice that

describes ways to develop a security program within the organization.

ISO 27003 - CORRECT ANSWER: ISO standard focused on implementation

ISO 27004 - CORRECT ANSWER: ISO standard for security management

ISO 27005 - CORRECT ANSWER: ISO standard on how to implement solutions based

upon risk management

ISO 27799 - CORRECT ANSWER: ISO standard focused on personal health info

ISO 9001 - CORRECT ANSWER: a quality management standard that has widespread

support and attention. ISO 9001 describes how production processes are to be managed and reviewed. It is not a standard of quality; it is about how well a system or process is documented.

Link Encryption - CORRECT ANSWER: encryption—The data is encrypted through the entire communication path. Because all header information is encrypted each node must decrypt and encrypt the routing information. Source and destination address cannot be seen to someone sniffing traffic.

Mantrap - CORRECT ANSWER: is used to prevent piggybacking and additional layers

of defense can be obtained by using guards and CCTV.

Military Data Classification - CORRECT ANSWER: Top Secret

Secret Sensitive but Unclassified Unclassified or Official

MOU - CORRECT ANSWER: Memorandum of Understanding is a document that

specifies terms and conditions for outsourcing partner organizations that must share data and info

  • / 4

MTBF - CORRECT ANSWER: mean time between failure (MTBF), which is used to

calculate the expected lifetime of a device. The higher the MTBF is, the better.

MTTR - CORRECT ANSWER: mean time to repair (MTTR). The MTTR is an estimate

of how long it takes to repair the equipment and get it back into use. For MTTR, lower numbers are better.

Name the 3 types of locks - CORRECT ANSWER: Grade 3: residential/consumer

Grade 2: light-duty and heavy-duty residential

Grade 1: High-security

NIST 800-37 - CORRECT ANSWER: Guide for Applying Risk Management Framework

to Federal Info Systems

On an IDS, which type of 'false' is worse? - CORRECT ANSWER: False Negative is

worse the False Positive because it means an attack occurred but IDS failed to detect it.

Patent - CORRECT ANSWER: Documents a process or synthesis and grants the owner

a legally enforceable right to exclude others from using it

Pod Slurping - CORRECT ANSWER: a technique for illicitly downloading or copying

data from a computer. Typically used for data exfiltration.

Policy - CORRECT ANSWER: A high-level document that dictates management

intentions toward security.

Private Data Classification - CORRECT ANSWER: Confidential

Private Sensitive Public

Procedure - CORRECT ANSWER: It is the most specific of security documents and it is a detailed, in-depth, step-by-step document that details exactly what is to be done.

SAN - CORRECT ANSWER: "a data storage system consisting of various storage

elements, storage devices, computer systems, and/or appliances, plus all the control software, all communicating in efficient harmony over a network." A SAN appears to the client OS as a local disk or volume that is available to be formatted and used locally as needed.

SED - CORRECT ANSWER: Self-Encrypting Drives: Compliance—SEDs have the ability to offer built-in encryption. This can help with compliance laws that many organizations must adhere to. Strong security—SEDs make use of strong encryption.The contents of an SED are always encrypted and the encryption keys are themselves encrypted and protected in hardware. Ease of use—Users only have to authenticate to the drive when the device boots up or when they change passwords/credentials. The

  • / 4

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

This document provided step-by-step guides, which enhanced my understanding. Absolutely remarkable!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Exam (elaborations)
Added: Dec 14, 2025
Description:

CISSP Exam Cram Latest Updated - Actual Exam 1000 Questions and 100% Verified Correct Answers Guaranteed A+ Annual Loss Expectancy - CORRECT ANSWER: ALE = SLE x ARO Annual Rate of Occurrence - CORR...

Unlock Now
$ 1.00