Complete, up-to-date coverage of the 2015 CISSP exam, including 1250+ realistic practice questions
Fully updated and featuring new exam question formats, this self- study tool contains more than 1250 realistic practice exam questions and offers 100% coverage of the 2015 CISSP Common Body of Knowledge. In-depth explanations of both the correct and incorrect answers are provided for every question. This book is the perfect companion to CISSP All-in-One Exam Guide, Seventh Edition.
Designed as an exam-focused self-study aid and resource, CISSP Practice Exams, Fourth Edition, fully covers the eight newly-revised exam domains. The logical structure of the book allows you to focus on specific topics and tailor your study to areas of expertise and weakness. Each chapter presents more than 25 exam questionsan additional 1000+ review questions are contained in the book's electronic content.
- Fully revised to cover new exam domains and the 2015 CISSP CBK
- Written by leading experts in IT security certification and training
- Electronic content features 1000+ practice exam questions, including questions in the new drag and drop and hotspot formats and a PDF copy of the book
Preface |
|
xi | |
Introduction |
|
xiii | |
|
Chapter 1 Security and Risk Management |
|
|
1 | (64) |
|
|
65 | (16) |
|
Chapter 3 Security Engineering |
|
|
81 | (96) |
|
Chapter 4 Communication and Network Security |
|
|
177 | (52) |
|
Chapter 5 Identity and Access Management |
|
|
229 | (40) |
|
Chapter 6 Security Assessment and Testing |
|
|
269 | (14) |
|
Chapter 7 Security Operations |
|
|
283 | (54) |
|
Chapter 8 Software Development Security |
|
|
337 | (46) |
Appendix About the CD-ROM |
|
383 | (4) |
Index |
|
387 | |
Shon Harris is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Forces Information Warfare unit, an instructor and an author. She has authored several international bestselling books on information security published by McGraw-Hill and Pearson which has sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks, security articles for publication and is a technical editor for Information Security Magazine. Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several U.S. government agencies over the last 18 years. Ms. Harris provides high-end, advanced and specialized consulting for organizations globally. She also works directly with law firms as a technical and expert witness on cases that range from patent infringement, criminal investigations, civil lawsuits and she specializes in cryptographic technologies. Ms. Harris has taught information security to a wide range of clients over the last 18 years, some of which have included; West Point, Microsoft, DHS, DoD, DoE, NSA, FBI, NASA, CDC, PWC, DISA, RSA, Visa, Intel, Cisco, Oracle, HP, Boeing, Northrop Grumman, Shell, Verizon, Citi, BoA, HSBC, Morgan Stanley, Symantec, Warner Brothers, Bridgestone, American Express, etc. Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.
Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues, from policy and procedure, through staffing and training, to scalable prevention, detection, and response technology and techniques. With a keen understanding of ROI and TCO, he has helped his clients achieve greater success for more than 12 years, advising in both the public and private sectors, from small upstarts to the Fortune 500. Jonathan has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than 2000 feet underground, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a member of the GIAC Advisory Board and is a SANS instructor teaching their MGT414: SANS Training Program for CISSP Certification course. He is also co-author of Network Forensics: Tracking Hackers through Cyberspace, a textbook published by Prentice-Hall.