Answers are in the same order as the question :
- Which of the following best describes the job duties of
security administrators?
- Security policies are policies that are set of
rules that have to be followed by the employees of the organisation
to ensures the data of organisation more confidential, this
policies are also followed by security administrator as well. So
all the policies are not made by security administrator. It
is not the correct answer.
- Security administrator are responsible to maintain the security
of the organisation's network by preventing the network from
unauthorised access, and from any external and internal threats as
well by designing the system more secure. So it is the
right answer.
- Security administrator not only check the employees comply with
security policies or not but also secures the system from outside
unauthorised access as well. So, this is not correct
option.
- Yes Security administrator ensure appropriate separation of
duties exists to prevent abuse of privilege but also secures the
system from outside threats as well. so it is not the right
option.
-
Managing incident response is a key area of which of the
following CBK domains?
- Information security governance and risk management domain of
the CISSP CBK deals with the identification of the organisation's
data and information and the development, updation and also the
implementation of the policies, procedure and guidlines of the
copany as well , that ensures the security of the organisation's
data and its integrity. But it is not for the managment of
the incident response , it is not correct answer.
- Security architecture and design domain deals with the security
architecture and software vulneribilities, also covers the security
models concept and the threats, which ensure the managment of
incident responce as well. that means this is right
answer.
- Business continuity and disaster recovery planning domain deals
with the strategies that ensures the continuity of the operation
and work flow with minimum fault or downtime. recovery plans are
there to prevent the loss from the disasters. it is not the
correct option as this domain does not manages incident
response.
- Operations security or Security operations domain deal with the
prevention of the oragnisation's data from the attack of
Cybercriminal, the team responsible for security operations
prevent, manages and update policies for the prevention of the
organisation's data. but it not deals with managment of the
incident response. so it is not correct
option
-
Understanding how to apply security in all stages of the
SDLC is a key area of which of the following CBK
domains?
-
AS in the above question we see that Information security
governance and risk management domain of the CISSP CBK deals with
the identification of the organisation's data and information and
the development, updation and also the implementation of the
policies, procedure and guidlines of the copany as well , that
ensures the security of the organisation's data and its integrity.
that means it provide the security in all stages of the SDLC as
well. this is the correct
option.
-
Software devlopment security deals with the confidentiality of
the application and its integrity, as in every stage of the
devlopment there is involvment of the humans. but it not provide
the security in all stages of the SDLC as well. this is not
the correct option.
-
Business continuity and disaster recovery planning domain deals
with the strategies that ensures the continuity of the operation
and work flow with minimum fault or downtime. recovery plans are
there to prevent the loss from the disasters. it does not deals
with the security so it is not the correct
answer.
-
Operations security or Security operations domain deal with the
prevention of the oragnisation's data from the attack of
Cybercriminal, that is done with data of the organisation, not the
developing software, so it is not the correct
option.
- Which of the following best describes deterrent
controls?
In this
question the deterrent control do all the three things that was in
option a,b,and d. as it reduce the likelihood of a deliberate
attack, also prevent the system from vulnerabilities and also
discover the attack and trigger the corrective control or
preventive control for the prevention. the c option is incorrect as
corrective control reduce the effect of an attack not detrrent
controls.
But the best describtion of the
deterrent control is it identify or discover the attack and trigger
the corrective control or preventive control for the prevention.
So option D is the correct
option.
KINDLY HIT LIKE!!!!!!!!!!!!!!!!!