Page 1177 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1177
Written Lab
1. Define the difference between need-to-know and the principle of
least privilege.
2. Name the common methods used to manage sensitive information.
3. Describe the purpose of monitoring the assignment and usage of
special privileges.
4. List the three primary cloud-based service models and identify the
level of maintenance provided by the cloud service provider in each
of the models.
5. How do change management processes help prevent outages?

