RCR 067: Practice CISSP Exam Questions on the TCB - CISSP Training and Study!

Feb 01, 2020

 

Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS

Description:

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will provide CISSP training for  Domain 3 (Engineering Secure Design) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/

CISSP Exam Questions

Question:  084

What is the most commonly used technique to protect against virus attacks?

  1. A) Signature detection
  2. B) Heuristic detection
  3. C) Data integrity assurance
  4. D) Automated reconstruction

Signature detection

Signature detection mechanisms use known descriptions of viruses to identify malicious code resident on a system.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Question:  085

In which of the following security modes can you be assured that all users have access permissions for all information processed by the system but will not necessarily need to know of all that information?

  1. A) Dedicated
  2. B) System high
  3. C) Compartmented
  4. D) Multilevel

System high

In system high mode, all users have appropriate clearances and access permissions for all information processed by the system but need to know only some of the information processed by that system.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Question:  086

What is a trusted computing base (TCB)?

  1. A) Hosts on your network that support secure transmissions
  2. B) The operating system kernel and device drivers
  3. C) The combination of hardware, software, and controls that work together to enforce a security policy
  4. D) The software and controls that certify a security policy

The combination of hardware, software, and controls that work together to enforce a security policy

The TCB is the combination of hardware, software, and controls that work together to enforce a security policy.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS: 

TRANSCRIPT:

  welcome to reduce that risk podcast episode 67 cissp sample exam questions welcome to the reduce cyber risk podcast where we provide you the training and tools you need to pass the cissp exam while enhancing your cyber-security career hi my name is Sean Gerber and I'm your host for this action-packed informative podcasts each week is I provide the information you need to grow your cybersecurity knowledge so that you're better prepared to pass the cissp exam say good morning everybody how you all doing this beautiful day we are in the wonderful state of Kansas and it is a balmy 35 degrees Fahrenheit so it's awesome but the good thing is tomorrow I get to head out of town on vacation for a couple days which is I'm a super excited about I cannot wait for that to happen I've been waiting a long time to have a couple days off and the best part about it is I have no children with me like heaven so yeah I'm pretty excited about that if you can't tell yet yeah it's that's pretty good so but before we get into my wonderful weekend Excursion that I'm having this week we are going to get into some sample exam questions yes so you are probably ready for this to occur and we are excited to hear some great cissp exam questions alright question number one what is the most commonly used technique to against virus attacks AAA signature detection heuristic detection see data Integrity Assurance D automated reconstruction all right so what is the most commonly used technique to protect against virus attacks and granite this is something to whatever people come up with cuz there's always somebody has an idea but based on this question signature detection heuristic detection data Integrity assurance and automated reconstruction for this question it is signature but that was a comes down to it as signature detection still is the primary technique to protect hottest legs up brainscape and there's different flashcards you can check those out those links are in the show notes I had to recommend you go check out and see if they've got for you all right question number 2 in which of the following security mode can you be sure that all users have access permissions were all the information processed by the system but will not necessarily need to know of all that information that's a lot of dolls and is a very long run-on sentence but which of the following security modes can you be sure that all users have access permissions for all information processed by the system but will not necessarily need to know that all that information beyaz system hi-seas crew compartmented D is multi-level is dedicated beyaz system high seas compartmented D is multi-level system high be in system high mode all users have appropriate clearances and access permissions for all information processed by the system but need to know only some of the information processed by that system no basis if your deal with classified your deal with the military you was all around need to know do you need to know that information and in many cases people don't they want to but hey you just can't so that's how that works is a trusted Computing base host on your network that supports secure Transmissions be the operating system kernel and device drivers see the combination of Hardware software and controls that work together to enforce a security policy D software controls that certify a security policy okay again what is the keytruda host on your network that supports secure Transmissions the operating system kernel and the device drivers the combination of Hardware software and controls at work together to enforce a security policy or D software controls that certify a security policy any answer is C the combination of Hardware software and controls at work together to enforce a security policy and that's what a PCB is alright hope you guys enjoy this wonderful episode go ahead and check me out at Shawn gerber.com some great content out there for you how you got cissp exam questions I got my one through eight cissp mini course along with the fact that if you want to you to purchase my entire cissp exam exam 24-hours long it isn't monster course and it's available to you for a very low price so getting go to Sean gerber.com and check it out alright we'll catch you on the flip side Sia thanks so much for joining me today on my podcast head over to Shawn gerber.com and look at all the free content that I have available for you there is a cissp mini course free cissp exam questions podcast and so much more it's all available to my email subscriber so sign up if you want my personalized cissp training purchase my training courses and I'll be there to help you with your cissp need so you can pass the test the first time thanks so much for listening will catch you on the flip side

Stay connected with news and updates!

Join our mailing list to receive the latest news and updates from our team. You'r information will not be shared.

Close

Don't you want to pass the CISSP....the FIRST time?

Get my FREE CISSP training videos (Domains 1 - 4) so I can show you how to pass the CISSP Exam...the FIRST time! .