Question

In: Computer Science

Which of the following best describes the job duties of security administrators? a) They create security...

Which of the following best describes the job duties of security administrators?

a)

They create security policies.

b)

They design secure systems.

c)

They check if employees comply with security policies.

d)

They ensure appropriate separation of duties exists to prevent abuse of privilege.

Managing incident response is a key area of which of the following CBK domains?

a)

Information security governance and risk management

b)

Security architecture and design

c)

Business continuity and disaster recovery planning

d)

Operations security

Understanding how to apply security in all stages of the SDLC is a key area of which of the following CBK domains?

a)

Information security governance and risk management

b)

Software development security

c)

Business continuity and disaster recovery planning

d)

Operations security

Which of the following best describes deterrent controls?

a)

Reduce the likelihood of a deliberate attack.

b)

Protect vulnerabilities.

c)

Reduce the effect of an attack.

d)

Discover attack and trigger preventive or corrective controls.

Solutions

Expert Solution

Answers are in the same order as the question :

  1. Which of the following best describes the job duties of security administrators?
    1. Security policies are policies that are set of rules that have to be followed by the employees of the organisation to ensures the data of organisation more confidential, this policies are also followed by security administrator as well. So all the policies are not made by security administrator. It is not the correct answer.
    2. Security administrator are responsible to maintain the security of the organisation's network by preventing the network from unauthorised access, and from any external and internal threats as well by designing the system more secure. So it is the right answer.
    3. Security administrator not only check the employees comply with security policies or not but also secures the system from outside unauthorised access as well. So, this is not correct option.
    4. Yes Security administrator ensure appropriate separation of duties exists to prevent abuse of privilege but also secures the system from outside threats as well. so it is not the right option.
  2. Managing incident response is a key area of which of the following CBK domains?

    1. Information security governance and risk management domain of the CISSP CBK deals with the identification of the organisation's data and information and the development, updation and also the implementation of the policies, procedure and guidlines of the copany as well , that ensures the security of the organisation's data and its integrity. But it is not for the managment of the incident response , it is not correct answer.
    2. Security architecture and design domain deals with the security architecture and software vulneribilities, also covers the security models concept and the threats, which ensure the managment of incident responce as well. that means this is right answer.
    3. Business continuity and disaster recovery planning domain deals with the strategies that ensures the continuity of the operation and work flow with minimum fault or downtime. recovery plans are there to prevent the loss from the disasters. it is not the correct option as this domain does not manages incident response.
    4. Operations security or Security operations domain deal with the prevention of the oragnisation's data from the attack of Cybercriminal, the team responsible for security operations prevent, manages and update policies for the prevention of the organisation's data. but it not deals with managment of the incident response. so it is not correct option
  3. Understanding how to apply security in all stages of the SDLC is a key area of which of the following CBK domains?

    1. AS in the above question we see that Information security governance and risk management domain of the CISSP CBK deals with the identification of the organisation's data and information and the development, updation and also the implementation of the policies, procedure and guidlines of the copany as well , that ensures the security of the organisation's data and its integrity. that means it provide the security in all stages of the SDLC as well. this is the correct option.

    2. Software devlopment security deals with the confidentiality of the application and its integrity, as in every stage of the devlopment there is involvment of the humans. but it not provide the security in all stages of the SDLC as well. this is not the correct option.

    3. Business continuity and disaster recovery planning domain deals with the strategies that ensures the continuity of the operation and work flow with minimum fault or downtime. recovery plans are there to prevent the loss from the disasters. it does not deals with the security so it is not the correct answer.

    4. Operations security or Security operations domain deal with the prevention of the oragnisation's data from the attack of Cybercriminal, that is done with data of the organisation, not the developing software, so it is not the correct option.

  4. Which of the following best describes deterrent controls?

​​​​​​​​​​​​​​In this question the deterrent control do all the three things that was in option a,b,and d. as it reduce the likelihood of a deliberate attack, also prevent the system from vulnerabilities and also discover the attack and trigger the corrective control or preventive control for the prevention. the c option is incorrect as corrective control reduce the effect of an attack not detrrent controls.

But the best describtion of the deterrent control is it identify or discover the attack and trigger the corrective control or preventive control for the prevention. So option D is the correct option.

KINDLY HIT LIKE!!!!!!!!!!!!!!!!!


Related Solutions

Which statement best describes the implied rights and duties of an employer that wishes to terminate...
Which statement best describes the implied rights and duties of an employer that wishes to terminate an employment relationship without cause? ( under canadian law system) a. Employers cannot be sued provided they provide two weeks of notice. b. Employers cannot terminate without just cause. c. Employers may terminate but must give reasonable notice. d. Employers may terminate provided they have “near cause” and give reasonable notice.
Which of the following best describes ribosomes?
Which of the following best describes ribosomes? Hollow cytoskeletal elements that act as organizers for the cytoskeleton, especially in cell division Contain digestive enzymes to breakdown non-functional organelles and foreign bodies that enter the cell The site of protein synthesis. Dense spherical body in the nucleus which are the synthesis site for ribosomal RNA and ribosomal subunits Houses all genetic material for the cell including DNA and RNA.
Which of the following best describes active surveillance?
Which of the following best describes active surveillance?
Which of the following best describes cis-transisomers?
Which of the following best describes cis-transisomers?They are mirror imagesThey have variations in arrangements around carbon carbon double bondsThey have different molecular formulasThey have the same chemical propertiesNone of the above
Which one of the following best describes a broker?
Which one of the following best describes a broker?A.intermediary who arranges trades between a buyer and a sellerB.trader who buys and sells from his or her inventoryC.firm which charges a commission for arranging a transactionD.person who buys securities for his or her own account on an exchange floorE.trader who transacts business on behalf of a securities issuer
1. Which of the following best describes a success scenario? - A statement that describes how...
1. Which of the following best describes a success scenario? - A statement that describes how certain decisions lead to success -A statement that defines what it means for the system to perform as intended   -A statement of what could go wrong within a system -A statement of who, what, when, where and how a system would fail 2. Which of the following variable types represent measurable properties of a system itself? -Input Variables -Output Variables -Exogenous Variables    -State Variables...
Which of the following classifications best describes the behaviour of Cost A?
Rymore Company has provided the following:JulyAugustSales in Units1,5001,600Cost A$35,000$36,000Cost B$16,000$16,000Cost C$67,500$72,000Which of the following classifications best describes the behaviour of Cost A?Select one:a. Mixed.b. Variable.c. Fixed.d. Opportunity cost.
Which of the following statements best describes an idaas implementation
Which of the following statements best describes an idaas implementation
Which of the following options best describes scope creep? a. It is the process by which...
Which of the following options best describes scope creep? a. It is the process by which requirements are gathered directly from stakeholders. b. It is the case in which stakeholders are interviewed a second time to verify and validate the system that is being developed. c. It is the case where requirements are added after the system a complete project specification. d. It is the process by which the system evolves into a developed state.
Which of the following items best describes the role of CAD in an organization?
Which of the following items best describes the role of CAD in an organization?A) It generates artifacts that are of little or no significant valueB) Speed is a more important factor than quality when making geometryC) CAD enables communication and collaboration between groupsD) CAD hinders archival of intellectual property
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT