Page 1177 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1177

Written Lab


                1.  Define the difference between need-to-know and the principle of
                    least privilege.


                2.  Name the common methods used to manage sensitive information.
                3.  Describe the purpose of monitoring the assignment and usage of

                    special privileges.

                4.  List the three primary cloud-based service models and identify the
                    level of maintenance provided by the cloud service provider in each
                    of the models.

                5.  How do change management processes help prevent outages?
   1172   1173   1174   1175   1176   1177   1178   1179   1180   1181   1182