CISSP - ISSAP Question Practice 1

แชร์
ฝัง
  • เผยแพร่เมื่อ 7 ก.ย. 2024
  • In this video i have discussed practice questions mapped with #cissp-issap topics
    How to Pass ISSAP Exam
    • How to Pass CISSP ISSA...

ความคิดเห็น • 14

  • @ferdinandf3208
    @ferdinandf3208 2 ปีที่แล้ว +1

    Hello Prabh, excellent videos, I found you because of ISSAP, would love to see more coffee shots on ISSAP from you. Thank you!

  • @JeevanrajPadhy070691
    @JeevanrajPadhy070691 ปีที่แล้ว +2

    Hello Prabh, In q#3 - How access control assures availability?
    Isn't the question incomplete?

  • @makp912
    @makp912 2 ปีที่แล้ว

    Excellent video and explanations. Thank you!

  • @chrisbuchheit
    @chrisbuchheit 2 ปีที่แล้ว

    Great video! However, for question 3, encryption can also be used to ensure integrity, not just confidentiality. :)

    • @Odinskie
      @Odinskie ปีที่แล้ว +3

      Integrity means in Information Security, is ensuring that the information being store or access remains the same . It also means the "ability" for the user/subject to check if the information was changed.
      Encryption can be use to ensure that only the right user/subject can "access" the information as they have the decryption key. Encryption, however, cannot ensure that the information or its content was change. A user/subject that can access the information can modify it anytime (malicious or not). Hashing on the other hand can help on the integrity of the information.
      As an example, if you want to "protect" the database from unauthorized users. One way is doing a database encryption (this is confidentiality). But to "ensure" the data being stored on the database remains intact or never modified, you can verify it with a hashes and compare that from your records (this is integrity).

    • @monimalabhattacharya2081
      @monimalabhattacharya2081 ปีที่แล้ว

      Encryption is basically for confidentiality, whereas Hashing ensures integrity. Encryption is reversible, whereas Hashing is irreversible , i.e., it validates that the data has not been subjected to any modifications

  • @JeevanrajPadhy070691
    @JeevanrajPadhy070691 ปีที่แล้ว

    Also, is architect involved in the exercise of development of policy? Or is the atchitect role begins after policy is written?

  • @muhammadakther6983
    @muhammadakther6983 2 ปีที่แล้ว

    thanks prabh, it's realy helpful

  • @ajayGrewal
    @ajayGrewal 2 ปีที่แล้ว

    This is gold

  • @rahulp2644
    @rahulp2644 2 ปีที่แล้ว

    😍👍