Académique Documents
Professionnel Documents
Culture Documents
Kaushlendr Partap
CISSP-ISSAP | CISA |Cobit5 | ISMS LA | BCMS LI
E-Mail : kaushlendar.pratap@koenig-solutions.com
studISCope
Official self assessment tool for CISSP and SSCP
Exam Strategies
TAKE FREQUENT BREAKS
Rank-em
Which car will give the best mileage?
A. 12 Cylinder stretch limo
B. 4 Cylinder sub compact
C. 8 Cylinder SUV
D. 8 Cylinder Luxury Car
A. Firewalls
B. Intrusion Protection Systems
C. Encryption
D. Training
Sequence
Which of these is not part of the development process?
A. Detail Design
B. Management Approval
C. End User Training
D. Functional Design
True or False
In which city did George Washington take his first oath
of office?
A. London, England
B. Chicago, Illinois
C. New York City, NY
D. San Francisco, California
Wrong Technology
Which of these is used to identify accidental changes
during transmission?
A.RC4
B.DES
C.RSA
D.MD5
All Except
Which of the following does NOT address Integrity?
A. Biba
B. Bell-La-Padula
C. Clark-Wilson
D. Brewer-Nash
Impossible to be correct
What is the goal of Risk Management?
A. Reduce risk to zero
B. Identify a way to blame others for security failures
C. Reduce Risk to a Manageable Level
D. Transfer 90% of identified risks
E. Transfer enough risk to satisfy shareholders
A. Cost-benefit analysis
B. Management Buy-in
C. Certification and Accreditation
D. Choosing the Project Leader
Scenario
A scenario will present a fact pattern, then several
questions based on it.
You need to read and understand the fact pattern, then
treat each question as a stand-alone event.
Drag-and-Drop Questions
#1 (drag-and-drop): Which of the following algorithms are examples of symmetric
cryptography. Drag and drop the correct answers from left to right.
To solve the question, simply click, drag and drop each correct answer
from the Possible Answers section to the Correct Answers box. In
this case, we should drag-and-drop AES, Blowfish and DES into the
Correct Answers box.
To solve the question, hover your mouse cursor on one of the areas on the diagram. All
available areas will light up as your mouse travels over them, and your selected answer
will stay lit when you click on it. In this case, wed want to deploy a firewall where we
could have a three legged configuration: Internet, internal (with Desktop and File
Server) and DMZ (with the Web Server).
More Info
www.koenig-solutions.com
www.koenig-india.com
www.koenig-consultancy.com
www.koenig-dubai.com
www.flip-classroom.com
www.koenig-dl.com
www.flymeatrainer.com
Thank You
Kaushlendr Partap
CISSP-ISSAP | CISA |Cobit5 | ISMS LA | BCMS LI
E-Mail : kaushlendar.pratap@koenig-solutions.com