Читать книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple - Страница 152

Written Lab

Оглавление

1 Name six different administrative controls used to secure personnel.

2 What are the basic formulas or values used in quantitative risk assessment?

3 Describe the process or technique used to reach an anonymous consensus during a qualitative risk assessment.

4 Discuss the need to perform a balanced risk assessment. What are the techniques that can be used and why is this necessary?

5 What are the main types of social engineering principles?

6 Name several types or methods of social engineering.

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

Подняться наверх