Reader small image

You're reading from  CISSP (ISC)² Certification Practice Exams and Tests

Product typeBook
Published inSep 2021
PublisherPackt
ISBN-139781800561373
Edition1st Edition
Right arrow
Author (1)
Ted Jordan
Ted Jordan
author image
Ted Jordan

Ted Jordan, MSc, CISSP has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He learned C language and UNIX administration while completing his Masters at UC Berkeley, and started his career at General Motors as an undergraduate of Kettering University in Flint, MI. He also did engineering with Silicon Graphics, The CAVE Virtual Reality, and SUN Microsystems. He trains and holds the CISSP, LPIC-1, Linux+, SUSE Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications. He is Founder and President of two successful tech startup companies including Funutation Tekademy Inc which teaches kids to program robots and write video games through their franchise operators. Ted lives with his family near Milwaukee, WI and enjoys tennis, golf, and karaoke.
Read more about Ted Jordan

Right arrow

Domain 7: Security Operations

7.1 Understand and comply with investigations:

  • Evidence collection and handling
  • Reporting and documentation
  • Investigative techniques
  • Digital forensics tools, tactics, and procedures
  • Artifacts (for example, a computer, network, or mobile device)

7.2 Conduct logging and monitoring activities:

  • Intrusion detection and prevention
  • Security Information and Event Management (SIEM)
  • Continuous monitoring
  • Egress monitoring
  • Log management
  • Threat intelligence (for example, threat feeds or threat hunting)
  • User and Entity Behavior Analytics (UEBA)

7.3 Perform Configuration Management (CM) (for example, provisioning, baselining, or automation)

7.4 Apply foundational security operations concepts:

  • Need-to-know/least privilege
  • Separation of Duties (SoD) and responsibilities
  • Privileged account management
  • Job rotation
  • Service Level Agreements (SLAs)

7.5 Apply resource protection...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
CISSP (ISC)² Certification Practice Exams and Tests
Published in: Sep 2021Publisher: PacktISBN-13: 9781800561373

Author (1)

author image
Ted Jordan

Ted Jordan, MSc, CISSP has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He learned C language and UNIX administration while completing his Masters at UC Berkeley, and started his career at General Motors as an undergraduate of Kettering University in Flint, MI. He also did engineering with Silicon Graphics, The CAVE Virtual Reality, and SUN Microsystems. He trains and holds the CISSP, LPIC-1, Linux+, SUSE Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications. He is Founder and President of two successful tech startup companies including Funutation Tekademy Inc which teaches kids to program robots and write video games through their franchise operators. Ted lives with his family near Milwaukee, WI and enjoys tennis, golf, and karaoke.
Read more about Ted Jordan