RCR 079: Practice CISSP Exam Questions for Security Incidents - CISSP Training and Study!

Feb 29, 2020

 

Subscribe: iTunes | Goggle Play | Stitcher Radio | RSS 

Description: 

Shon Gerber from ShonGerber.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge while providing superior training from his years of training people in cybersecurity.   

In this episode, Shon will provide CISSP training for Domain 7 (Security Operations) of the CISSP Exam.  His extensive training will cover all of the CISSP domains. 

BTW - Get access to all my CISSP Training Courses here at:  https://shongerber.com/ 

CISSP Exam Questions 

Question:  119 

  1. What is considered a Computer Security Incident? 
    1. Earthquake hits your data center rendering it unusable 
    2. A patch was implemented resulting in a loss of a critical system 
    3. Local construction workers cut the fiber line that provides a network feed for your building 
    4. An employee violated the company's acceptable use policy by downloading pirated software 

Explanation: [d] A violation of a company's acceptable use policy is considered a Computer Security Incident.   The other options fit within the broad concept of an incident. 

------------------------------------ 

Question:  120 

  1. What is the primary goal of a Change Management Process within an organization? 
    1. Provide good structure for making changes within a network 
    2. Avoid outages within your network 
    3. Provide documentation on all changes within a network 
    4. All the above 

Explanation: [b] The primary goal of a Change Management Process is to avoid outages within your network environment.  All of the above are important, but the primary goal is to avoid outages.   

------------------------------------ 

Question:  121 

  1. Which of the following is are considered a strategic strategy for backups within a business environment? 
    1. Full Backup 
    2. Incremental Backup 
    3. Differential Backup 
    4. All the above 

Explanation: [d] All of the above are considered a strategic solution for you backups within a business environment.   

------------------------------------ 

Want to find Shon elsewhere on the internet? 

LinkedIn – www.linkedin.com/in/shongerber 

Facebook - https://www.facebook.com/CyberRiskReduced/ 

LINKS:  

TRANSCRIPT:

Welcome to reduce cyber risk podcast cissp exam questions welcome to reduce cyber risk podcast where we provide you the training and tools you need to pass the cissp exam while enhancing your cybersecurity career hi my name is Sean Gerber and I'm your host of this action-packed informative podcasts join me each week is I provide the information you need to grow your cybersecurity knowledge so that you're better prepared to pass the cissp exam well good morning to you all I hope you all are having a wonderful Saturday this one is podcast great day and that you have a lot planned for this coming weekend maybe you're working study for cissp maybe you're out just relaxing and enjoying the beautiful weather maybe you are skiing depending upon where you're at on a globe you could be skiing or you could be walking outside with a face mask on cuz coronavirus as eating your face off I don't know what is possible anywhere you're at it's hard to say but in today's world just just there's never ending drama and I think that's just kind of overwhelming anymore because it's just like just stop the madness we are going to stop the madness with 3 cissp exam cancel that you have the tools you need to pass the CIA the first time right also question a Numero Uno what is considered a computer security incident a earthquake hit your Datacenter rendering it unusable that'll be cool let me not cool but it's kind of cool black hole if you live there now but they're kind of cool because it's when the ground shakes it's kind of cool scary very very scary but cool the Apaches implemented resulting in loss of critical systems local construction workers cut the fiber line that provides you a network fee a company's acceptable use policy by download my downloading pirated software idea was considered a computer security incident earthquake patches implemented result of a loss of a critical system nope see the construction workers cut the fiber line employee violated your acceptable use policy by downloading pirated software dilation of your company's acceptable use policy is considered a computer security incident all other options fit within a broad concept of an incident but they're not necessarily a computer question numero 2 numero deuce Dost Dost Dost Dost Dost primary goal of change management process within an organization good structure for making changes within a network a avoid outages within your network C provide documentation on all changes within your network or D All the Above the primary goal of a change management process within an organization provides structure for making changes within the network avoid outages within your network provide documentation on all changes within the network or D all of the above the change management process is it's just basically hey I want to put a computer and play kielbasa do that which I sure go ahead dude just go plug it in at night you had to have to say hey Bob gives your less spleen and then when you give you the spleen then I will tell Gina and then Gina was in at it into the bucket to make sure it's done quick change management process and so therefore it is be a boy outages within your network you don't want your spleen giving away to anybody just because you just don't do want to do that that's not a good idea but it be avoided outages within your network so that is question number 203 what which of the following is considered a full backup incremental backup C differential backup all the above backup what is it which of the following is considered a strategic strategy for backups long-term strategic strategizing my daughter is funny she won from China English language little bit not laughing at her I'm laughing with her she left too but when we talk about strategic she said is strategy JJ something like that it was it wasn't even the word it was something really strange but does your strategic strategy for back LSU distance tragic strategy but you would have gotten that far strategic backup for business environment is full backup incremental backup differential backup or the only Above All the Above every one of those is a very important part of your strategic back-up plan barr-nunn they are all very important sleeping the plan for them all do not just playing for what wonderful day you can go to Sean gerber.com College Hill redirected to Stronger. Com we can go to Sugar that, and get my mini cissp course to help you start along with there's a bunch of samples cissp questions for you to sign up for my list you will get access to many many more things that are available for you be coming out here and they coming weeks and months all right I hope you all and also one last thing you will see in a couple weeks my pot training for podcasters who are 24 podcast my training for people who are comparative advantage of that and see my cast is Johnny all right have a wonderful day we'll catch you on the flip side thanks so much for joining me today on my podcast head over to Shawn gerber.com and look at all the free content that I have available for you there is a cissp mini course free cissp exam questions podcast and so much more it's all available to my email subscriber so sign up if you want my personalized cissp training if your cissp need so you can pass the test the first time thanks so much for listening will catch you on the flip side CPI

CISSP Cyber Training Academy Program!

Are you an ambitious Cybersecurity or IT professional who wants to take your career to a whole new level by achieving the CISSP Certification? 

Let CISSP Cyber Training help you pass the CISSP Test the first time!

LEARN MORE | START TODAY!