0%

Book Description

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers, you'll gain a better understanding of the key concepts associated with the ten domains of the common body of knowledge (CBK). Each question is designed to test you on the information you'll need to know in order to pass the exam. Along with explanations of the answers to these advanced questions, you'll find discussions on some common incorrect responses as well. In addition to serving as an excellent tutorial, this book presents you with the latest developments in information security. It includes new information on:

  • Carnivore, Echelon, and the U.S. Patriot Act

  • The Digital Millennium Copyright Act (DMCA) and recent rulings

  • The European Union Electronic Signature Directive

  • The Advanced Encryption Standard, biometrics, and the Software Capability Maturity Model

  • Genetic algorithms and wireless security models

  • New threats and countermeasures

The CD-ROM includes all the questions and answers from the book with the Boson-powered test engine.

Note: The ebook version does not provide access to the companion files.

Book Description

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers, you'll gain a better understanding of the key concepts associated with the ten domains of the common body of knowledge (CBK). Each question is designed to test you on the information you'll need to know in order to pass the exam. Along with explanations of the answers to these advanced questions, you'll find discussions on some common incorrect responses as well. In addition to serving as an excellent tutorial, this book presents you with the latest developments in information security. It includes new information on:

  • Carnivore, Echelon, and the U.S. Patriot Act

  • The Digital Millennium Copyright Act (DMCA) and recent rulings

  • The European Union Electronic Signature Directive

  • The Advanced Encryption Standard, biometrics, and the Software Capability Maturity Model

  • Genetic algorithms and wireless security models

  • New threats and countermeasures

The CD-ROM includes all the questions and answers from the book with the Boson-powered test engine.

Note: The ebook version does not provide access to the companion files.

Table of Contents

  1. Cover Page
  2. The Wiley
  3. Title Page
  4. Copyright
  5. Dedication
  6. Contents
  7. Acknowledgments
  8. About the Author
  9. Introduction
  10. CHAPTER 1: Security Management
    1. Advanced Sample Questions
  11. CHAPTER 2: Access Control
    1. Advanced Sample Questions
  12. CHAPTER 3: Telecommunications and Network Security
    1. Advanced Sample Questions
  13. CHAPTER 4: Cryptography
    1. Advanced Sample Questions
  14. CHAPTER 5: Security Architecture and Models
    1. Advanced Sample Questions
  15. CHAPTER 6: Operations Security
    1. Advanced Sample Questions
  16. CHAPTER 7: Applications and Systems Development
    1. Advanced Sample Questions
  17. CHAPTER 8: Business Continuity Planning—Disaster Recovery Planning
    1. Advanced Sample Questions
  18. CHAPTER 9: Law, Investigation, and Ethics
    1. Advanced Sample Questions
  19. CHAPTER 10: Physical Security
    1. Advanced Sample Questions
  20. APPENDIX A: Answers to Sample Questions
    1. Chapter 1—Security Management Practices
    2. Chapter 2—Access Control Systems and Methodology
    3. Chapter 3—Telecommunications and Network Security
    4. Chapter 4—Cryptography
    5. Chapter 5—Security Architecture and Models
    6. Chapter 6—Operations Security
    7. Chapter 7—Applications and Systems Development
    8. Chapter 8—Business Continuity Planning—Disaster Recovery Planning
    9. Chapter 9—Law, Investigation, and Ethics
    10. Chapter 10—Physical Security
    11. Notes
  21. APPENDIX B: What's on the CD-ROM
    1. System Requirements
    2. Using the CD with Windows
    3. What's on the CD
    4. Troubleshooting
  22. Index
  23. Wiley Publishing, Inc. End-User License Agreement