Sometimes its helpful to just know the answer ...
I've spent a long time committing the wrong things to memory by guessing, and thats never been more apparent than while studying for the CISSP.
It can be helpful to just read a TRUE statement, and say "okay π€·ββοΈ"...
IPsec, or Internet Protocol Security, can provide encryption, access control, nonrepudiation, and message authentication using public key cryptography.
In an infrastructure as a service (IaaS) environment, the company that provides cloud environment has final control of all the virtual machines and networks. Thus, to protect data, the best option is to encrypt the data.
NetFlow records contain an entry for every network communication session that took place on a network and can be compared to a list of known malicious hosts.
The most common cause of a false positive for a water-based system is human error. If you turn off the water source after a fire and forget to turn it back on, you'll be in trouble for the future.
Data retention policies can reduce the amount of old logs and other files that may need to be produced during a legal case.
Duress systems are intended to allow employees to notify security or others when they are in a dangerous situation or when they need help.
The CIS benchmarks provide a useful security standard and baseline to assess systems against or to configure them to.