MSP-IT wrote: » The keyword here is "determined". If you have an intent to break into a data center, a fence would be the least of your worries.From McGraw-Hill:Which of the following gives an accurate picture of biometrics?a. Relvatively inexpensive, well received by society, and highly accurateb. Very expensive, moderately received by society, and moderately accuratec. Very expensive, very well received by society, and highly accurated. Very expensive, not well received by society, and highly accurateI could see how this could be the case in retinal scanning, but as for other biometric authentication modes, I don't agree with this answer. I would say that B would be the better answer.
TheProfezzor wrote: » I doubt it. Biometrics are highly accurate and what they teach and tell you in the CBK's is just the options you have for the BioMetrics. I've read in the Sybex book that InfoSec people are considering incorporating individual "Heart Beat Signature" into the BioMetric's somehow but it also told me that the technology hasn't yet been developed but, this could be an option. But, obviously, one would opt for the most accurate Biometric system, i.e. Iris or Retina (If User's Accept).Both are known to be highly accurate, very expensive and society has problems accepting it. In my opinion, the answer is 'D'.
teancum144 wrote: » My personal experience with a fingerprint scanner on the IBM ThinkPad is that they are only moderately accurate (lots of false negatives). As a result, I don't uses it, but I know other people that do. Seems that answer 'b' fits my scenario.
CyberfiSecurity wrote: » In the aftermath of computer crime, it is discovered that the act was carried out by an employee with privileged access. Of the following, which would be considered the best method for preventing privileged user misuse? A. Regular reviews and recertification by management B. Upgrade IDS software C. Audit trails should be better utilized D. Security policy should be updated
TheProfezzor wrote: » The answer would be 'A'. Conduct regular account reviews for any access aggregations and authorization creeps and re certify the ACL.
teancum144 wrote: » What is tricky about this question is the word "preventing". How would reviews and recertification "prevent" privileged user misuse?
TheProfezzor wrote: » RAID-5 This is also called striping with parity. It uses three or more disks with the equivalent of one disk holding parity information. If any single disk fails, the RAID array will continue to operate, though it will be slower. My question is, is the above statement correct?
TheProfezzor wrote: » Which of the following should be used, to detect early fire? A: Rate of Rise of Temperature Fire Detection. B: Fire Detection Alarm, after a specific temperature has been reached. C: Smoke detectors Non of them
TheProfezzor wrote: » 1 - What fence would a data company deploy, in order to deter determined intruders? a- 4 Feet High b- 8 Feet High c- 6 Feet High, with barbed wires d- They cannot deter a determined intruderDilemma: I've read that fences 8 feet high can deter determined intruders. But, one of the McGrawHill quiz tells me that a determined intruder cannot be deterred. Both the answers seem logical.
EasyPeezy wrote: » That odd moment when… You thought you were fully prepared for the CISSP exams until you saw a question that says: At which ITSEC level are high-integrity requirements for networks introduced? A. E6 B. AV C. DI D. DX …and you say to yourself. I know about the Es and Fs… surely this isn’t one of the 25 beta questions. AV, DI, DX.... what are they???
TheProfezzor wrote: » You Sir, have successfully managed to scare the **** out of me. Knowing I am to write the exam in a week and I have no idea, what this question is about. Holy Mother of All Security Professionals :P
CyberfiSecurity wrote: » Since Dr. EasyPeezy is British, I assume his study focus on ITSEC. Honestly, I have never seen AV, DX, and DI in my CISSP studies. I assume the American CISSP focus on the Orange book and Common Criteria. Canadian has its own version, but I don't know what are in those. To me... E6 = Evaluation level 6 in the ITSEC AV = Anti-Virus or Absolute Value DX = Some sort of record DI = as a former U.S Marine I treat it as DRILL INSTRUCTOR lol
Erinkima wrote: » Which access control model allows the system administrator to define specific rights and privileges to that group? a) Discretionary Access Control b) Mandatory Access Control c) Role based Access Control d) Rule based access control The answers given is D but I thought it should be C. Any can explain?