Preface xvii
Domain 1: Acc ess Control 1
Scenario-Based Questions, Answers, and Explanations 124
Sources and References 128
Domain 2: Telecommunic ations and Network Security 129
Traditional Questions, Answers, and Explanations 129
Scenario-Based Questions, Answers, and Explanations 263
Sources and References 266
Domain 3: Information Security Governance and Ris k Management 269
Traditional Questions, Answers, and Explanations 269
Scenario-Based Questions, Answers, and Explanations 346
Sources and References 350
Domain 4: Software Development Security 351
Traditional Questions, Answers, and Explanations 351
Scenario-Based Questions, Answers, and Explanations 434
Sources and References 437
Domain 5: Cryptography 439
Traditional Questions, Answers, and Explanations 439
Scenario-Based Questions, Answers, and Explanations 523
Sources and References 525
Domain 6: Security Architecture and Desig n 527
Traditional Questions, Answers, and Explanations 527
Scenario-Based Questions, Answers, and Explanations 607
Sources and References 612
Domain 7: Security Operations 613
Traditional Questions, Answers, and Explanations 613
Scenario-Based Questions, Answers, and Explanations 694
Sources and References 698
Domain 8: Busi ness Continuity and Dis aster Recovery Planning 699
Traditional Questions, Answers, and Explanations 699
Scenario-Based Questions, Answers, and Explanations 740
Sources and References 742
Domain 9: Legal, Regulations, Investigations, and Compliance 743
Traditional Questions, Answers, and Explanations 743
Scenario-Based Questions, Answers, and Explanations 823
Sources and References 825
Domain 10: Physic al and Environmental Security 827
Traditional Questions, Answers, and Explanations 827
Scenario-Based Questions, Answers, and Explanations 863
Sources and References 866
Appendix A: CISSP Gloss ary 2012 867
Appendix B: CISSP Ac ronyms and Abb reviations 2012 1057
Index 1083