{"id":16406,"date":"2019-11-19T20:56:05","date_gmt":"2019-11-20T01:56:05","guid":{"rendered":"https:\/\/bangla.salearningschool.com\/recent-posts\/must-know-for-an-information-security-professional-a-cissp-professional-will-know-these-in-general\/"},"modified":"2019-11-19T21:26:43","modified_gmt":"2019-11-20T02:26:43","slug":"must-know-for-an-information-security-professional-a-cissp-professional-will-know-these-in-general","status":"publish","type":"post","link":"http:\/\/bangla.sitestree.com\/?p=16406","title":{"rendered":"Must know for an Information Security Professional (A CISSP professional will know these in general)"},"content":{"rendered":"<p>Must know for an Information Security Professional (A CISSP professional will know these in general) . Want to be a security professional, learn these as well.<\/p>\n<div>What is a security policy?<\/p>\n<p>What are policies in general?<\/p>\n<p>What are the different types of Security Controls?<\/p>\n<p>Give examples of Audit Trail.<\/p>\n<p>Give examples of security guard.<\/p>\n<p>Difference between authentication and authorization<\/p>\n<p>Can SSO be decentralized? How can you implement that? Just examples are good.<\/p>\n<p>What is the least privilege policy?<\/p>\n<p>What is a job rotation policy?<\/p>\n<p>TACAS, RADIUS what are these? Does your organization need to use these? In what cases? Is it a good fit?<\/p>\n<p>Give examples of access control attacks?<\/p>\n<p>Give examples of Social Engineering?<\/p>\n<p>What is your experience with reviewing the access configurations?<\/p>\n<p>What TCP\/IP, OSI, ATM, QoS?<\/p>\n<p>Give examples of Network Access Control Devices?<\/p>\n<p>Give examples on how Network Access Control Devices are used in your organization? How can you configure them?<\/p>\n<p>Is Endpoint security a good practice? What is Endpoint security anyway?<\/p>\n<p>POTS, PBX, VoIP &#8211; does your organization use these? What are the related security risks?<\/p>\n<p>How can attackers inject data into video stream (video conferencing)?<\/p>\n<p>Give examples of Tunneling Protocols? esp. the secured ones?<\/p>\n<p>Is VPN a tunneling concept? What protocols are used on VPN?<\/p>\n<p>How is IpSec data formatted? What is AH ? What is ESP?<\/p>\n<p>What is the primary purpose of SSL and TLS?<\/p>\n<p>What is a Syn Flood Attack.<\/p>\n<p>What is spoofing?<\/p>\n<p>What is VLAN? Will you implement VLAN in your organization? When?<\/p>\n<p>What is the concept of Risk when it comes to organizational IT resource security?<\/p>\n<p>Can your security measures mitigate all risks?<\/p>\n<p>What is the relation between a security policy and local laws and regulations?<\/p>\n<p>Does your organization conduct Due care and Due diligence for security?<\/p>\n<p>How do you ensure confidentiality, integrity, and availability?<\/p>\n<p>How is managing information lifecycle important for an organization?<\/p>\n<p>To which organizations HIPAA apply?<\/p>\n<p>What are Risk Avoidance, Risk transference, Risk Mitigation, Risk Acceptance?<\/p>\n<p>Can Risk Acceptance be acceptable policy? Give examples&#8230;<\/p>\n<p>How can you apply and ensure security in the software development lifecycle?<\/p>\n<p>What are backdoors in software?<\/p>\n<p>What is XSS security risk? How can you prevent XSS?<\/p>\n<p>What is security testing?<\/p>\n<p>Can you use white box testing as a security measure?<\/p>\n<p>Should you encrypt all sensitive &#8211; data files?<\/p>\n<p>Define Symmetric and Asymmetric cryptography? Give examples. Which one is more secure?<\/p>\n<p>What is Hybrid cryptography, What is Hashing?<\/p>\n<p>What is Social Engineering for Key Discovery?<\/p>\n<p>What is a rainbow table attack?<\/p>\n<p>What is PKI? How does PKI work?<\/p>\n<p>What are security models?<\/p>\n<p>What is Bell-Lapadula model?<\/p>\n<p>What is Biba model?<\/p>\n<p>what is Clark-Wilson access model.<\/p>\n<p>How can XML traffic be protected?<\/p>\n<p>OWASP what is it? Who sponsors OWASP?<\/p>\n<p>How can Separation of duties and responsibilities help with security?<\/p>\n<p>What is the last step in incident response?<\/p>\n<p>What is root cause analysis?<\/p>\n<p>What is change management?<\/p>\n<p>How do software configuration, and configuration management help with security?<\/p>\n<p>What you know About RAID? Describe in your own way.<\/p>\n<p>Give example ways you can make your servers fault tolerant.<\/p>\n<p>Give an example of a backup strategy for a hypothetical organization.<\/p>\n<p>Give types and examples of computer crimes.<\/p>\n<p>What is Shrinkwrap contract?<\/p>\n<p>Give some example guidelines from ISC code of Professional Ethics.<\/p>\n<p>Give examples of forensic procedures.<\/p>\n<p>Give examples of Site and facility design considerations for security?<\/p>\n<\/div>\n<div>By<\/div>\n<div><\/div>\n<div>\n<div dir=\"ltr\" data-smartmail=\"gmail_signature\">\n<div dir=\"ltr\">\n<div>\n<div dir=\"ltr\">\n<div>\n<div dir=\"ltr\">\n<div>\n<div dir=\"ltr\">\n<div dir=\"ltr\">\n<div dir=\"ltr\">\n<div dir=\"ltr\">\n<div dir=\"ltr\">\n<div dir=\"ltr\">\n<div dir=\"ltr\">\n<div dir=\"ltr\">\n<div>\n<div>\n<div>\n<div><span style=\"font-family: arial, sans-serif;\"><i><b>Sayed Ahmed<\/b><br \/>\n<\/i><\/span><\/div>\n<\/div>\n<div><span style=\"font-family: arial, sans-serif;\"><i><b>Linkedin<\/b>:\u00a0<a href=\"https:\/\/ca.linkedin.com\/in\/sayedjustetc\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/ca.linkedin.com\/in\/sayedjustetc&amp;source=gmail&amp;ust=1574302397215000&amp;usg=AFQjCNFrS2hTLtQhoOrSmQqIeSR0W5SU9A\">https:\/\/ca.linkedin.com\/in\/<wbr><\/wbr>sayedjustetc<\/a><br \/>\n<\/i><\/span><\/div>\n<\/div>\n<p><span style=\"font-family: arial, sans-serif;\"><i><b>Blog<\/b>:\u00a0<a href=\"http:\/\/bangla.salearningschool.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/bangla.salearningschool.com\/&amp;source=gmail&amp;ust=1574302397215000&amp;usg=AFQjCNGVObCWIZtdYW2ystdNUo7zsZo4Gw\">http:\/\/Bangla.<wbr><\/wbr>SaLearningSchool.com<\/a>,\u00a0<a href=\"http:\/\/sitestree.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/sitestree.com&amp;source=gmail&amp;ust=1574302397216000&amp;usg=AFQjCNGV-S4wOXM7bgDbcDFgdA1IDN_O4A\">http:\/\/<wbr><\/wbr>SitesTree.com<\/a>\u00a0<\/i><\/span><\/p>\n<\/div>\n<div><span style=\"font-family: arial, sans-serif;\"><i><b>Online and Offline Training<\/b>:\u00a0<a href=\"http:\/\/training.sitestree.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/training.SitesTree.com&amp;source=gmail&amp;ust=1574302397216000&amp;usg=AFQjCNGVuz9kWU-AfHwUF5bx-RgppKy4JQ\">http:\/\/Training.SitesTree.com<\/a>\u00a0<\/i><\/span><\/div>\n<div><span style=\"font-family: arial, sans-serif;\"><i>\u00a0<\/i><\/span><\/div>\n<div><span style=\"font-family: arial, sans-serif;\"><i><b>I<\/b>f you want to contribute to the operation of this site including occasional\u00a0free online training (using Skype, Zoom.us):\u00a0<a href=\"http:\/\/training.sitestree.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/training.sitestree.com\/&amp;source=gmail&amp;ust=1574302397216000&amp;usg=AFQjCNGdxgJXCU3Z911zx6uiXnccNBA1pA\">http:\/\/Training.<wbr><\/wbr>SitesTree.com<\/a>\u00a0(or charitable\/non-profit work in the education sector), you can financially contribute to: safoundation at\u00a0<a href=\"http:\/\/salearningschool.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/salearningschool.com&amp;source=gmail&amp;ust=1574302397216000&amp;usg=AFQjCNHjkORACGQXkuifeU11roFX7PJUvQ\">salearningschool.com<\/a>\u00a0using\u00a0Paypal. Sometime, we also provide\u00a0\u00a0\u00a0<\/i><\/span><\/div>\n<div><b><span style=\"font-family: arial, sans-serif;\"><i>\u00a0<\/i><\/span><\/b><\/div>\n<div><b><span style=\"font-family: arial, sans-serif;\"><i>Affiliate Links:<\/i><\/span><\/b><\/div>\n<div><span style=\"font-family: arial, sans-serif;\"><i>Hottest Deals on Amazon USA:\u00a0<a href=\"http:\/\/tiny.cc\/38lddz\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/tiny.cc\/38lddz&amp;source=gmail&amp;ust=1574302397216000&amp;usg=AFQjCNGE39WmekpvTeA1DTg8B827QDLSfg\">http:\/\/tiny.cc\/38lddz<\/a><br \/>\n<\/i><\/span><\/div>\n<div><span style=\"font-family: arial, sans-serif;\"><i>Hottest Deals on Amazon CA:\u00a0<a href=\"http:\/\/tiny.cc\/bgnddz\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/tiny.cc\/bgnddz&amp;source=gmail&amp;ust=1574302397216000&amp;usg=AFQjCNHMvGa0HW_5Og1ECNKT655qm7QW1A\">http:\/\/tiny.cc\/bgnddz<\/a><br \/>\n<\/i><\/span><\/div>\n<div><span style=\"font-family: arial, sans-serif;\"><i>Hottest Deals on Amazon Europe:\u00a0<a href=\"http:\/\/tiny.cc\/w4nddz\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/tiny.cc\/w4nddz&amp;source=gmail&amp;ust=1574302397216000&amp;usg=AFQjCNH7c8gXuQgDJuswPtnKZuR1qNb3Pg\">http:\/\/tiny.cc\/w4nddz<\/a><\/i><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Must know for an Information Security Professional (A CISSP professional will know these in general) . Want to be a security professional, learn these as well. What is a security policy? What are policies in general? What are the different types of Security Controls? Give examples of Audit Trail. Give examples of security guard. Difference &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"http:\/\/bangla.sitestree.com\/?p=16406\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[182],"tags":[],"class_list":["post-16406","post","type-post","status-publish","format-standard","hentry","category---blog","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":26258,"url":"http:\/\/bangla.sitestree.com\/?p=26258","url_meta":{"origin":16406,"position":0},"title":"Must know for an Information Security Professional (A CISSP professional will know these in general) #Root","author":"Author-Check- Article-or-Video","date":"April 21, 2021","format":false,"excerpt":"Must know for an Information Security Professional (A CISSP professional will know these in general) . Want to be a security professional, learn these as well. What is a security policy? What are policies in general? What are the different types of Security Controls? Give examples of Audit Trail. Give\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26256,"url":"http:\/\/bangla.sitestree.com\/?p=26256","url_meta":{"origin":16406,"position":1},"title":"Part-2: If you want to learn security, or if you already are a security professional\/engineer, can you answer the following questions on Security? Do you know (and can do) the answers to the following questions on Security? #Root","author":"Author-Check- Article-or-Video","date":"April 21, 2021","format":false,"excerpt":"What are the important concepts to know and implement for Infrastructure security? Consider only the software side. What are patching, hardening, enabling encryption, filtering connections in regards to network infrastructure? What is the relation with security? What will you do in regards to these? How is software patching different for\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16417,"url":"http:\/\/bangla.sitestree.com\/?p=16417","url_meta":{"origin":16406,"position":2},"title":"Do you want to be an information security professional?","author":"Sayed","date":"November 21, 2019","format":false,"excerpt":"Do you want to be an information security professional or an Ethical Hacker? Then you can learn by finding answers to the following questions. You can search Google, read book, or even ask the security professionals around you to get the answers. Knowing these (and doing\/practicing\/analyzing\/thinking\/applying\/building\/relating) for sure will help.\u2026","rel":"","context":"In &quot;\u09ac\u09cd\u09b2\u0997 \u0964 Blog&quot;","block_context":{"text":"\u09ac\u09cd\u09b2\u0997 \u0964 Blog","link":"http:\/\/bangla.sitestree.com\/?cat=182"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16399,"url":"http:\/\/bangla.sitestree.com\/?p=16399","url_meta":{"origin":16406,"position":3},"title":"Part-2: If you want to learn security, or if you already are a security professional\/engineer, can you answer the following questions on Security? Do you know (and can do) the answers to the following questions on Security?","author":"Sayed","date":"November 17, 2019","format":false,"excerpt":"What are the important concepts to know and implement for Infrastructure security? Consider only the software side.What are patching, hardening, enabling encryption, filtering connections in regards to network infrastructure? What is the relation with security? What will you do in regards to these?How is software patching different for Network Hardware\u2026","rel":"","context":"In &quot;\u09ac\u09cd\u09b2\u0997 \u0964 Blog&quot;","block_context":{"text":"\u09ac\u09cd\u09b2\u0997 \u0964 Blog","link":"http:\/\/bangla.sitestree.com\/?cat=182"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26260,"url":"http:\/\/bangla.sitestree.com\/?p=26260","url_meta":{"origin":16406,"position":4},"title":"Do you want to be an information security professional? #Root","author":"Author-Check- Article-or-Video","date":"April 21, 2021","format":false,"excerpt":"Do you want to be an information security professional or an Ethical Hacker? Then you can learn by finding answers to the following questions. You can search Google, read book, or even ask the security professionals around you to get the answers. Knowing these (and doing\/practicing\/analyzing\/thinking\/applying\/building\/relating) for sure will help.\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":66312,"url":"http:\/\/bangla.sitestree.com\/?p=66312","url_meta":{"origin":16406,"position":5},"title":"Java Design Patterns and Examples #Java Short Notes","author":"Author-Check- Article-or-Video","date":"July 18, 2021","format":false,"excerpt":"J2EE core design patterns: Click on a pattern rectangle to explore Data Access Object Transfer Object From: http:\/\/sitestree.com\/?p=4934 Categories:Java Short NotesTags: Post Data:2007-06-04 16:27:01 Shop Online: https:\/\/www.ShopForSoul.com\/ (Big Data, Cloud, Security, Machine Learning): Courses: http:\/\/Training.SitesTree.com In Bengali: http:\/\/Bangla.SaLearningSchool.com http:\/\/SitesTree.com 8112223 Canada Inc.\/JustEtc: http:\/\/JustEtc.net (Software\/Web\/Mobile\/Big-Data\/Machine Learning) Shop Online: https:\/\/www.ShopForSoul.com\/ Medium: https:\/\/medium.com\/@SayedAhmedCanada","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/16406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16406"}],"version-history":[{"count":2,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/16406\/revisions"}],"predecessor-version":[{"id":16411,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/16406\/revisions\/16411"}],"wp:attachment":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16406"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}