Reduce Cyber Risk Podcast - Cyber Security Made Simple

RCR 065: How to Pass the CISSP Exam - CISSP Training and Study


Listen Later

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity. 

In this episode, Shon will provide CISSP training for  Domain 3 (Engineering Secure Design) of the CISSP Exam.  His extensive training will cover all of the CISSP domains.

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/ 

CISSP Exam Questions

Question:  078

Which database security risk occurs when data from a higher classification level is mixed with data from a lower classification level?

  1. A) Aggregation
  2. B) Inference
  3. C) Contamination
  4. D) Polyinstantiation

Contamination

Contamination is the mixing of data from a higher classification level and/or need-to-know requirement with data from a lower classification level and/or need-to-know requirement.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Question:  079

How many major categories do the TCSEC criteria define?

  1. A) Two
  2. B) Three
  3. C) Four
  4. D) Five

Four

TCSEC defines four major categories: category A is verified protection, category B is mandatory protection, category C is discretionary protection, and category D is minimal protection.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Question:  080

Which Bell-LaPadula property keeps lower-level subjects from accessing objects with a higher security level?

  1. A) (star) Security Property
  2. B) No write up property
  3. C) No read up property
  4. D) No read down property

No read up property

The no read up the property, also called the Simple Security Policy, prohibits subjects from reading a higher security level object.

Source:  https://www.brainscape.com/flashcards/security-architecture-and-design-983876/packs/1774328>

------------------------------------

Want to find Shon elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS: 

  • ISC2 Training Study Guide
    • https://www.isc2.org/Training/Self-Study-Resources
  • Online Article
    • https://thorteaches.com/what-is-the-best-way-to-study-for-the-cissp-certification/

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free. 

...more
View all episodesView all episodes
Download on the App Store

Reduce Cyber Risk Podcast - Cyber Security Made SimpleBy Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur