1101

Each Response To A Single CISSP Essay Question Should Be About A Half-page In Length (about 150 Words).

1. Not all information has the same importance and value to a company. How data is classified is an important factor used in determining the amounts of funding and resources that should be applied to protecting each type of data. Describe the data classification levels within commercial and military organizations and provide examples of the types of information that would be classified at each classification level.

 

2. It takes a team of individuals throughout the organization working together to safeguard the integrity and confidentiality of data resources. Describe the layers of responsibility within an organization when it comes to asset security and data protection. For each role, discuss their responsibility within the organization for asset security. 

 

 

3. The architecture of a computer system is very important and comprises many topics. The system must ensure that memory is properly segregated and protected, ensure that



only authorized subjects access objects, ensure that untrusted processes cannot perform activities that would put other processes at risk, control the flow of information, and define a domain of resources for each subject. It also must ensure that if the computer experiences any type of disruption, it will not result in an insecure state. Many of these issues are dealt with in the system’s security policy, and the security mode is built to support the requirements of this policy. Explain the concept of a trusted computing base and describe how it is used to enforce the system’s security policy. Provide examples of specific elements (hardware, software or firmware) in the architecture of the computer system could be used that provide security within the TCB.

 

AS  WE HAD AGREED THE 2 ADDITIONAL QUESTIONS HAVE BEEN ADDED AND SO IS THE TIME AND AMOUNT.

 

LET ME KNOW IF THERE'S ANYTHING ELSE NEED!

 

4. Describe what data



leak prevention (DLP) is and compare the benefits and drawbacks of network DLP, endpoint DLP, and hybrid DLP

 

5. Define cloud computing and describe the differences between Software as as Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). Define parallel computing and describe bit-level parallelism,  instruction-level parallelism, task-level parallelism, and data parallelism.

 

 


Question Field

Asked by woodalex
4 years ago
NO ANSWERS YET
RELATED QUESTIONS
84 Rank 414 Views
 CIS 111

Asked by christopher85 4 years ago

765 Rank 927 Views
691 Rank 501 Views
 -

Asked by morgan36 4 years ago

1005 Rank 947 Views
1259 Rank 699 Views
1138 Rank 87 Views
 Database Design

Asked by nbruce 4 years ago

611 Rank 999 Views
 Case Study Part 3

Asked by fwilliams 4 years ago

139 Rank 1211 Views
 Formula And Functions

Asked by rhensley 4 years ago

1025 Rank 566 Views