CISSP PRACTICE QUESTIONS – 20211125

Effective CISSP Questions

You are developing an anomaly-based IDS that employs artificial intelligence to categorize intrusion examples into various groups. Which of the following is the most intelligent approach to train the model? (Wentz QOTD)
A. Comprehensive knowledge base
B. Pre-selected features by subject matter experts
C. Ubiquitous deployment of sensors and agents
D. Layers of processing for feature transformation and extraction

Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

My suggested answer is D. Layers of processing for feature transformation and extraction.

Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams and an informative reference for security professionals.

Classification of IDS
Classification of IDS (source: https://doi.org/10.1002/ett.4150)

IDS Detection Capability and Deployment

  • A comprehensive knowledge base is more critical to signature-based or knowledge-based IDS instead of anomaly-based IDS.
  • Ubiquitous deployment of sensors and agents is about IDS deployment, host-based or network-based.

Dimensionality Reduction

  • In normal cases, domain knowledge plays an important role in selecting features. However, it’s tiresome to do so manually when given hundreds of variables. That said, manual feature engineering, e.g., pre-selected features by subject matter experts, is tedious and impractical.
  • Layers of processing for feature transformation and extraction imply an automated process of feature projection, e.g., Deep Learning.
Dimensionality reduction algorithms
Dimensionality reduction algorithms (Source: LearnDataSci)

Machine Learning and Deep Learning

Machine Learning and Deep Learning
Machine Learning and Deep Learning (Source: https://medium.datadriveninvestor.com/not-so-deep-learning-2c51bae54c9d)
Deep Neural Network
Deep Neural Network (Source: Reddit)

Reference


您正在開發一個基於異常的 IDS,它使用人工智能將入侵案例為不同的組別。 以下哪項是訓練模型的最智能方法? (Wentz QOTD)
A. 綜合知識庫
B. 主題專家預先選擇的特徵 (feature)
C. 無處不在的傳感器和代理部署
D. 多個特徵轉換和提取的處理層



Leave a Reply