chơi xổ số keno trực tuyến

{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2025-03-04T08:01:11+00:00"},"categoryId":33772,"data":{"title":"Study Skills & Test Prep","slug":"study-skills-test-prep","image":{"src":null,"width":0,"height":0},"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772}],"parentCategory":{"categoryId":33662,"title":"Academics & The Arts","slug":"academics-the-arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"}},"childCategories":[{"categoryId":33773,"title":"CompTIA A+","slug":"comptia-aplus","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33773"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":39,"bookCount":1},{"categoryId":33774,"title":"ACCUPLACER","slug":"accuplacer","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33774"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":6,"bookCount":1},{"categoryId":33775,"title":"ACT","slug":"act","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33775"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":85,"bookCount":7},{"categoryId":33776,"title":"Armed Services","slug":"armed-services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":272,"bookCount":7},{"categoryId":33777,"title":"CISSP","slug":"cissp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33777"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":69,"bookCount":1},{"categoryId":33778,"title":"Citizenship Tests","slug":"citizenship-tests","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33778"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1,"bookCount":2},{"categoryId":33779,"title":"CompTIA PenTest+","slug":"comptia-pentestplus","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33779"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":11,"bookCount":1},{"categoryId":33780,"title":"CPA Exam","slug":"cpa-exam","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33780"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":61,"bookCount":1},{"categoryId":33782,"title":"EMT Exam","slug":"emt-exam","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33782"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":107,"bookCount":1},{"categoryId":33783,"title":"GED","slug":"ged","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33783"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":109,"bookCount":4},{"categoryId":33784,"title":"GMAT","slug":"gmat","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33784"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":28,"bookCount":5},{"categoryId":33785,"title":"GRE","slug":"gre","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33785"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":41,"bookCount":5},{"categoryId":33786,"title":"LSAT","slug":"lsat","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33786"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":72,"bookCount":2},{"categoryId":33787,"title":"MAT","slug":"mat","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33787"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":78,"bookCount":1},{"categoryId":33788,"title":"NCLEX-RN","slug":"nclex-rn","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33788"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":10,"bookCount":1},{"categoryId":33789,"title":"Officer Candidate Tests","slug":"officer-candidate-tests","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33789"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":4,"bookCount":1},{"categoryId":33790,"title":"PHR/SPHR Exam","slug":"phr-sphr-exam","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33790"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":63,"bookCount":2},{"categoryId":33791,"title":"Physician Assistant Exam","slug":"physician-assistant-exam","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33791"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":183,"bookCount":1},{"categoryId":33792,"title":"Police Officer Exam","slug":"police-officer-exam","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33792"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":6,"bookCount":1},{"categoryId":33793,"title":"Real Estate Licensure Exam","slug":"real-estate-licensure-exam","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33793"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":87,"bookCount":1},{"categoryId":33794,"title":"SAT","slug":"sat","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33794"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":59,"bookCount":6},{"categoryId":33795,"title":"Securities Industry Essentials Exam","slug":"securities-industry-essentials-exam","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33795"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":16,"bookCount":2},{"categoryId":33796,"title":"Series 7 Exam","slug":"series-7-exam","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33796"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":57,"bookCount":2},{"categoryId":33797,"title":"SSAT & ISEE","slug":"ssat-isee","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33797"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":7,"bookCount":1},{"categoryId":33798,"title":"TASC","slug":"tasc","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33798"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":30,"bookCount":1},{"categoryId":33799,"title":"General Study Skills & Test Prep","slug":"general-study-skills-test-prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33799"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":34,"bookCount":4},{"categoryId":34326,"title":"PMP Certification","slug":"pmp-certification","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34326"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":false,"articleCount":139,"bookCount":0},{"categoryId":34340,"title":"PSAT","slug":"psat","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34340"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":false,"articleCount":42,"bookCount":0},{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":9,"bookCount":1}],"description":"Testing, testing, 1-2-3. From college placement exams through advanced professional certifications, we've got easy-to-follow prep plans built to foster success. Take practice quizzes, get test-day tips, and bone up on whatever it is you need to know.","relatedArticles":{"self":"//dummies-api.coursofppt.com/v2/articles?category=33772&offset=0&size=5"},"hasArticle":true,"hasBook":true,"articleCount":1727,"bookCount":63},"_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":1749,"items":[{"headers":{"creationTime":"2021-10-27T21:31:33+00:00","modifiedTime":"2024-12-20T21:13:11+00:00","timestamp":"2024-12-21T00:01:13+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"CCSP","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"slug":"ccsp","categoryId":34392}],"title":"CCSP: Data Security Technologies and Strategies","strippedTitle":"ccsp: data security technologies and strategies","slug":"ccsp-data-security-technologies-and-strategies","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"When studying for the CCSP exam, consider how to implement data security technologies and design data security strategies.","noIndex":0,"noFollow":0},"content":"When studying for the <a href=\"//coursofppt.com/article/academics-the-arts/study-skills-test-prep/ccsp/ccsp-for-dummies-cheat-sheet-273450/\">CCSP exam</a>, you must consider how to implement data security technologies and design data security strategies that fit your business and security needs. The following technologies are commonly applied as part of a comprehensive data security strategy in the cloud:\r\n<ul>\r\n \t<li>Encryption and key management</li>\r\n \t<li>Hashing</li>\r\n \t<li>Data loss prevention (DLP)</li>\r\n \t<li>Data de-identification (by masking and data obfuscation)</li>\r\n \t<li>Tokenization</li>\r\n</ul>\r\n<h2 id=\"tab1\" >Encryption and key management</h2>\r\nAs encryption pertains to cloud data security, encryption and key management are critical topics that must be fully understood in order to pass the CCSP exam. With resource pooling (and multitenancy) being a key characteristic of cloud computing, it’s important to remember that physical separation and protections are not commonly available in cloud environments. As such, strategic use of encryption is crucial to ensuring secure data storage and use in the cloud.\r\n<p class=\"article-tips remember\">When designing or implementing encryption technologies, remember that an encryption architecture has three basic components:</p>\r\n\r\n<ul>\r\n \t<li>The data being secured</li>\r\n \t<li>The encryption engine that performs all encryption operations</li>\r\n \t<li>The encryption keys used to secure the data</li>\r\n</ul>\r\nWhile it would seem like encrypting everything would be the best way to ensure data security, it’s important to consider that encryption has a performance impact on systems; system resources are used in order to process encryption algorithms every time data is encrypted or decrypted, which can add up if encryption is used excessively. As a CCSP, it is up to you to implement encryption so that data is as secure as possible while minimizing the impact to system performance.\r\n\r\nCountless other challenges and considerations exist when implementing encryption technologies, both on-prem and in cloud environments. Some key cloud encryption challenges are\r\n<ul>\r\n \t<li>Almost all data processing requires that data is in an unencrypted state. If a cloud customer is using a CSP for data analysis or processing, then encryption can be challenging to implement.</li>\r\n \t<li>Encryption keys are cached in memory when in use and often stay there for some time. This consideration is a major point of in multitenant environments because memory is a shared resource between tenants. CSPs must implement protections against tenants’ keys being accessed by tenants who share the same resources.</li>\r\n \t<li>Cloud data is often highly replicated (for availability purposes), which can make encryption and key managing challenging. Most CSPs have mechanisms in place to ensure that any copies of encrypted data remain encrypted.</li>\r\n \t<li>Throughout the entire data lifecycle, data can change states, locations, and format, which can require different applications of encryption along the way. Managing these changes may be a challenge, but understanding the Cloud Secure Data Lifecycle can help design complete end-to-end encryption solutions.</li>\r\n \t<li>Encryption is a confidentiality control at heart. It does not address threats to integrity of data on its own. Other technologies discussed throughout this chapter should be implemented to address integrity concerns.</li>\r\n \t<li>The effectiveness of an encryption solution is dependent upon how securely the encryption keys are stored and managed. As soon as an encryption key gets into the wrong hands, all data protected with that key is compromised. Keys that are managed by the CSP may potentially be accessed by malicious insiders, while customer-managed encryption keys are often mishandled or mismanaged.</li>\r\n</ul>\r\nAs the last point indicates, key management is a huge factor in ensuring that encryption implementations effectively secure cloud data. Because of its importance and the challenges associated with key management in the cloud, this task is typically one of the most complicated ones associated with securing cloud data.\r\n\r\nWhen developing your organization’s encryption and key management strategy, it’s important that you consider the following:\r\n<ul>\r\n \t<li><strong>Key generation:</strong> <span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">Encryption keys should be generated within a trusted, secure cryptographic module. FIPS 140-</span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">3 </span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">validated modules have been tested and certified to meet certain requirements that </span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">demonstrate</span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\"> tamper resistance and integrity of encryption keys.</span></li>\r\n \t<li><strong>Key distribution:</strong> It’s important that encryption keys are distributed securely to prevent theft or compromise during transit. One best practice is to encrypt keys with a separate encryption key while distributing to other parties (in PKI applications, for example). The worst thing that could happen is sending out a bunch of “secret” keys that get stolen by malicious eavesdroppers!</li>\r\n \t<li><strong>Key storage:</strong> Encryption keys must be protected at rest (both in volatile and persistent memory) and should never be stored in plaintext. Keys may be stored and managed internally on a virtual machine or other integrated application, externally and separate from the data itself, or managed by a trusted third party that provides key escrow services for secure key management. A <em>Hardware Security Module </em>(HSM) is a physical device that safeguards encryption keys. Many cloud providers provide HSM services, as well as software-based HSM capabilities.</li>\r\n \t<li><strong>Key destruction or deletion:</strong> At the end of the encryption key’s lifecycle, there will be a time that the key is no longer needed. <em>Key destruction</em> is the removal of an encryption key from its operational location. <em>Key deletion</em> takes it a step further and also removes any information that could be used to reconstruct that key. To prevent a Denial of Service due to unavailable keys, deletion should only occur after an archival period that includes substantial analysis to ensure that the key is in fact no longer needed.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Cloud environments rely heavily on encryption throughout the entire data lifecycle. While encryption itself is used for confidentiality, the widespread use of encryption means that availability of the encryption keys themselves is a major concern. Pay close attention to availability as you’re designing your key management systems and processes.</p>\r\n\r\n<h2 id=\"tab2\" >Hashing</h2>\r\n<em>Hashing</em>, as depicted, is the process of taking an arbitrary piece of data and generating a unique string or number of fixed-length from it. Hashing can be applied to any type of data — documents, images, database files, virtual machines, and more.\r\n\r\n[caption id=\"attachment_274158\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274158\" src=\"//coursofppt.com/wp-content/uploads/ccsp-hashing.jpg\" alt=\"Hashing.\" width=\"556\" height=\"284\" /> Hashing.[/caption]\r\n\r\nHashing in a data structure provides a mechanism to ensure the integrity of data. Hashes are similar to human fingerprints, which can be used to uniquely identify a single person to whom that fingerprint belongs. As seen, even the slightest change to a large text file will noticeably change the output of the hashing algorithm. Hashing is incredibly useful when you want to be sure that what you’re looking at now is the same as what you created before. In cloud environments, hashing helps verify that virtual machine instances haven’t been modified (maliciously or accidentally) without your knowledge. Simply hash your VM image before running it and compare it to the hash of the known-good VM image; the hash outputs should be identical.\r\n<p class=\"article-tips warning\">The term hashing is sometimes used interchangeably with encryption, but they are very different! Encryption is a two-way function, meaning what can be encrypted can be decrypted. Conversely, hashing is a one-way function. You can only generate a hash of an object; you cannot retrieve an object from its hash. Encryption, again, is used to provide confidentiality, while hashing provides integrity checking. Be careful not to confuse these two terms!</p>\r\nSeveral hashing algorithms are available, but the SHA (Secure Hash Algorithm) family of algorithms are amongst the most popular. Specific algorithms are outside the scope of this book, but you can research SHA-1, SHA-2, and SHA-3 for additional context.\r\n<h2 id=\"tab3\" >Data Loss Prevention (DLP)</h2>\r\n<em>Data loss prevention </em>(DLP), also known as data leakage prevention, is the set of technologies and practices used to identify and classify sensitive data, while ensuring that sensitive data is not lost or accessed by unauthorized parties.\r\n\r\n[caption id=\"attachment_274157\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274157\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-loss-prevention.jpg\" alt=\"Data Loss Prevention (DLP).\" width=\"556\" height=\"88\" /> Data Loss Prevention (DLP).[/caption]\r\n\r\nDLP can be applied to help restrict the flow of both structured and unstructured data to authorized locations and users. Effective use of DLP goes a long way to helping organizations safeguard their data’s confidentiality, both on-prem and in the cloud. To put it plainly, DLP analyzes data storage, identifies sensitive data components, and prevents users from accidentally or maliciously sending that sensitive data to the wrong party.\r\n\r\nWhen designing a DLP strategy, organizations must consider how the technology fits in with their existing technologies, processes, and architecture. DLP controls need to be thoroughly understood and applied in a manner that aligns with the organization’s overall enterprise architecture in order to ensure that only the right type of data is blocked from being transmitted.\r\n\r\nHybrid cloud users, or users that utilize a combination of cloud-based and on-prem services, should pay extremely close attention to their enterprise security architecture while developing a DLP strategy. Because data traverses both cloud and noncloud environments, a poor DLP implementation can result in segmented data security policies that are hard to manage and ineffective.\r\n<p class=\"article-tips remember\">DLP that is incorrectly implemented can lead to false-positives (for example, blocking legitimate traffic) or false-negatives (allowing sensitive data to be sent to unauthorized parties).</p>\r\nDLP implementations consist of three core components or stages:\r\n<ul>\r\n \t<li><strong>Discovery and classification:</strong> The first stage of DLP is discovery and classification. <em>Discovery</em> is the process of finding all instances of data, and <em>classification</em> is the act of categorizing that data based on its sensitivity and other characteristics. Examples of classifications may include “credit card data,” “Social Security numbers,” “health records,” and so on. Comprehensive discovery and proper classification is crucial to success during the remaining DLP stages.</li>\r\n \t<li><strong>Monitoring:</strong> After data has been fully discovered and classified, it is able to be monitored. Monitoring is an essential component of the DLP implementation and involves watching data as it moves throughout the cloud data lifecycle. The monitoring stage is where the DLP implementation is looking to identify data that is being misused or handled outside of established usage policies. Effective DLP monitoring should happen on storage devices, networking devices, servers, workstations, and other endpoints — and it should evaluate traffic across all potential export routes (email, Internet browsers, and so on).</li>\r\n \t<li><strong>Enforcement:</strong> The final DLP stage, enforcement, is where action is taken on policy violations identified during the monitoring stage. These actions are configured based on the classification of data and the potential impact of its loss. Violations of less sensitive data is traditionally logged and/or alerted on, while more sensitive data can actually be blocked from unauthorized exposure or loss. A common use-case here is financial services companies that detect credit card numbers being emailed to unauthorized domains and are able to stop the email in its tracks, before it ever leaves the corporate network.</li>\r\n</ul>\r\nAlways remember “Security follows the data” — and DLP technology is no different. When creating a DLP implementation strategy, it’s important that you consider techniques for monitoring activity in every data state. DLP data states are\r\n<ul>\r\n \t<li><strong>DLP at rest:</strong> For data at rest, the DLP implementation is stored wherever the data is stored, such as a workstation, file server, or some other form of storage system. Although this DLP implementation is often the simplest, it may need to work in conjunction with other DLP implementations to be most effective.</li>\r\n \t<li><strong>DLP in transit:</strong> <em>Network-based DLP</em> is data loss prevention that involves monitoring outbound traffic near the network perimeter. This DLP implementation monitors traffic over Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP), and other protocols.</li>\r\n</ul>\r\n<p class=\"article-tips warning\">If the network traffic being monitored is encrypted, you will need to integrate encryption and key management technologies into your DLP solution. Standard DLP implementations cannot effectively monitor encrypted traffic, such as HTTPS.</p>\r\n\r\n<ul>\r\n \t<li><strong>DLP in use:</strong> <em>Host-based,</em> or <em>endpoint-based, DLP</em> is data loss prevention that involves installation of a DLP application on a workstation or other endpoint device. This DLP implementation allows monitoring of all data in use on the client device and provides insights that network-based DLP are not able to provide.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Because of the massive scale of many cloud environments, host-based DLP can be a major challenge. There are simply too many hosts and endpoints to monitor without a sophisticated strategy that involves automated deployment. Despite this challenge, host-based DLP is not impossible in the cloud, and CSPs continue to make monitoring easier as new cloud-native DLP features become available.</p>\r\nAfter you understand DLP and how it can be used to protect cloud data, there are a few considerations that cloud security professionals commonly face when implementing cloud-based DLP:\r\n<ul>\r\n \t<li>Cloud data is highly distributed and replicated across locations. Data can move between servers, from one data center to another, to and from backup storage, or between a customer and the cloud provider. This movement, along with the data replication that ensures availability, present challenges that need to be worked through in a DLP strategy.</li>\r\n \t<li>DLP technologies can impact performance. Host-based DLP scan all data access activities on an endpoint, and network-based DLP scan all outbound network traffic across a network boundary. This constant monitoring and scanning can impact system and network performance and must be considered while developing and testing your DLP strategy.</li>\r\n \t<li>Cloud-based DLP can get expensive. The pay-for-what-you-use model is often a great savings to cloud customers, but when it comes to DLP, the constant resource utilization associated with monitoring traffic can quickly add up. It’s important to model and plan for resource consumption costs on top of the costs of the DLP solution itself.</li>\r\n</ul>\r\n<h2 id=\"tab4\" >Data de-identification</h2>\r\nConfidentiality is incredibly important, especially in the cloud. While mechanisms like encryption and DLP go a long way to providing data confidentiality, they’re not always feasible. <em>Data de-identification</em> (or <em>anonymization</em>) is the process of removing information that can be used to identify a specific individual from a dataset. This technique is commonly used as a privacy measure to protect Personally Identifiable Information (PII) or other sensitive information from being exposed when an entire dataset is shared. The following figure depicts the purest form of data de-identification; in this example, student names have been removed in order to protect the confidentiality of their grades.\r\n\r\nSeveral techniques are available to de-identify sensitive information; masking (or obfuscation) and tokenization are two of the most commonly used methods.\r\n\r\n[caption id=\"attachment_274156\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274156\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-de-identification.jpg\" alt=\"Data de-identification.\" width=\"556\" height=\"158\" /> Data de-identification.[/caption]\r\n<h3>Masking</h3>\r\n<em>Masking</em> is the process of partially or completely replacing sensitive data with random characters or other nonsensitive data. Masking, or <em>obfuscation, </em>can happen in a number of ways, but the following figure is a visual depiction of the most popular type of data masking, which is commonly used to protect credit card numbers and other sensitive financial information.\r\n\r\n[caption id=\"attachment_274155\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274155\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-masking.jpg\" alt=\"Data masking.\" width=\"556\" height=\"205\" /> Data masking.[/caption]\r\n\r\nAs a cloud security professional, you can use several techniques when masking or obfuscating data. Here are a few to remember:\r\n<ul>\r\n \t<li><strong>Substitution:</strong> <em>Substitution</em> mimics the look of real data, but replaces (or appends) it with some unrelated value. Substitution can either be random or algorithmic, with the latter allowing two-way substitution — meaning if you have the algorithm, then you can retrieve the original data from the masked dataset.</li>\r\n \t<li><strong>Scrambling:</strong> <em>Scrambling</em> mimics the look of real data, but simply jumbles the characters into a random order. For example, a customer’s whose account number is #5551234 may be shown as #1552435 in a development environment. (For what it’s worth, my scrambled phone number is 0926381135.)</li>\r\n \t<li><strong>Deletion or nulling:</strong> This technique is just what it sounds like. When using this masking technique, data appears blank or empty to anyone who isn’t authorized to view it.</li>\r\n</ul>\r\nAside from being used to comply with regulatory regulations (like HIPAA or PCI DSS), data masking is often used when organizations need to use production data in a test or development environment. By masking the data, development environments are able to use real data without exposing sensitive data elements to unauthorized viewers or less secure environments.\r\n<h3>Tokenization</h3>\r\n<em>Tokenization</em> is the process of substituting a sensitive piece of data with a nonsensitive replacement, called a <em>token.</em> The token is merely a reference back to the sensitive data, but has no meaning or sensitivity on its own. The token maintains the look and feel of the original data and is mapped back to the original data by the tokenization engine or application. Tokenization allows code to continue to run seamlessly, even with randomized tokens in place of sensitive data.\r\n<p class=\"article-tips tip\"><em>Tokenization</em> can be outsourced to external, cloud-based tokenization services (referred to as tokenization-as-a-service). When using these services, it’s prudent to understand how the provider secures your data both at rest and in transit between you and their systems.</p>","description":"When studying for the <a href=\"//coursofppt.com/article/academics-the-arts/study-skills-test-prep/ccsp/ccsp-for-dummies-cheat-sheet-273450/\">CCSP exam</a>, you must consider how to implement data security technologies and design data security strategies that fit your business and security needs. The following technologies are commonly applied as part of a comprehensive data security strategy in the cloud:\r\n<ul>\r\n \t<li>Encryption and key management</li>\r\n \t<li>Hashing</li>\r\n \t<li>Data loss prevention (DLP)</li>\r\n \t<li>Data de-identification (by masking and data obfuscation)</li>\r\n \t<li>Tokenization</li>\r\n</ul>\r\n<h2 id=\"tab1\" >Encryption and key management</h2>\r\nAs encryption pertains to cloud data security, encryption and key management are critical topics that must be fully understood in order to pass the CCSP exam. With resource pooling (and multitenancy) being a key characteristic of cloud computing, it’s important to remember that physical separation and protections are not commonly available in cloud environments. As such, strategic use of encryption is crucial to ensuring secure data storage and use in the cloud.\r\n<p class=\"article-tips remember\">When designing or implementing encryption technologies, remember that an encryption architecture has three basic components:</p>\r\n\r\n<ul>\r\n \t<li>The data being secured</li>\r\n \t<li>The encryption engine that performs all encryption operations</li>\r\n \t<li>The encryption keys used to secure the data</li>\r\n</ul>\r\nWhile it would seem like encrypting everything would be the best way to ensure data security, it’s important to consider that encryption has a performance impact on systems; system resources are used in order to process encryption algorithms every time data is encrypted or decrypted, which can add up if encryption is used excessively. As a CCSP, it is up to you to implement encryption so that data is as secure as possible while minimizing the impact to system performance.\r\n\r\nCountless other challenges and considerations exist when implementing encryption technologies, both on-prem and in cloud environments. Some key cloud encryption challenges are\r\n<ul>\r\n \t<li>Almost all data processing requires that data is in an unencrypted state. If a cloud customer is using a CSP for data analysis or processing, then encryption can be challenging to implement.</li>\r\n \t<li>Encryption keys are cached in memory when in use and often stay there for some time. This consideration is a major point of in multitenant environments because memory is a shared resource between tenants. CSPs must implement protections against tenants’ keys being accessed by tenants who share the same resources.</li>\r\n \t<li>Cloud data is often highly replicated (for availability purposes), which can make encryption and key managing challenging. Most CSPs have mechanisms in place to ensure that any copies of encrypted data remain encrypted.</li>\r\n \t<li>Throughout the entire data lifecycle, data can change states, locations, and format, which can require different applications of encryption along the way. Managing these changes may be a challenge, but understanding the Cloud Secure Data Lifecycle can help design complete end-to-end encryption solutions.</li>\r\n \t<li>Encryption is a confidentiality control at heart. It does not address threats to integrity of data on its own. Other technologies discussed throughout this chapter should be implemented to address integrity concerns.</li>\r\n \t<li>The effectiveness of an encryption solution is dependent upon how securely the encryption keys are stored and managed. As soon as an encryption key gets into the wrong hands, all data protected with that key is compromised. Keys that are managed by the CSP may potentially be accessed by malicious insiders, while customer-managed encryption keys are often mishandled or mismanaged.</li>\r\n</ul>\r\nAs the last point indicates, key management is a huge factor in ensuring that encryption implementations effectively secure cloud data. Because of its importance and the challenges associated with key management in the cloud, this task is typically one of the most complicated ones associated with securing cloud data.\r\n\r\nWhen developing your organization’s encryption and key management strategy, it’s important that you consider the following:\r\n<ul>\r\n \t<li><strong>Key generation:</strong> <span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">Encryption keys should be generated within a trusted, secure cryptographic module. FIPS 140-</span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">3 </span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">validated modules have been tested and certified to meet certain requirements that </span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\">demonstrate</span><span class=\"NormalTextRun SCXW172544049 BCX0\" data-ccp-parastyle=\"Bullet\"> tamper resistance and integrity of encryption keys.</span></li>\r\n \t<li><strong>Key distribution:</strong> It’s important that encryption keys are distributed securely to prevent theft or compromise during transit. One best practice is to encrypt keys with a separate encryption key while distributing to other parties (in PKI applications, for example). The worst thing that could happen is sending out a bunch of “secret” keys that get stolen by malicious eavesdroppers!</li>\r\n \t<li><strong>Key storage:</strong> Encryption keys must be protected at rest (both in volatile and persistent memory) and should never be stored in plaintext. Keys may be stored and managed internally on a virtual machine or other integrated application, externally and separate from the data itself, or managed by a trusted third party that provides key escrow services for secure key management. A <em>Hardware Security Module </em>(HSM) is a physical device that safeguards encryption keys. Many cloud providers provide HSM services, as well as software-based HSM capabilities.</li>\r\n \t<li><strong>Key destruction or deletion:</strong> At the end of the encryption key’s lifecycle, there will be a time that the key is no longer needed. <em>Key destruction</em> is the removal of an encryption key from its operational location. <em>Key deletion</em> takes it a step further and also removes any information that could be used to reconstruct that key. To prevent a Denial of Service due to unavailable keys, deletion should only occur after an archival period that includes substantial analysis to ensure that the key is in fact no longer needed.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Cloud environments rely heavily on encryption throughout the entire data lifecycle. While encryption itself is used for confidentiality, the widespread use of encryption means that availability of the encryption keys themselves is a major concern. Pay close attention to availability as you’re designing your key management systems and processes.</p>\r\n\r\n<h2 id=\"tab2\" >Hashing</h2>\r\n<em>Hashing</em>, as depicted, is the process of taking an arbitrary piece of data and generating a unique string or number of fixed-length from it. Hashing can be applied to any type of data — documents, images, database files, virtual machines, and more.\r\n\r\n[caption id=\"attachment_274158\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274158\" src=\"//coursofppt.com/wp-content/uploads/ccsp-hashing.jpg\" alt=\"Hashing.\" width=\"556\" height=\"284\" /> Hashing.[/caption]\r\n\r\nHashing in a data structure provides a mechanism to ensure the integrity of data. Hashes are similar to human fingerprints, which can be used to uniquely identify a single person to whom that fingerprint belongs. As seen, even the slightest change to a large text file will noticeably change the output of the hashing algorithm. Hashing is incredibly useful when you want to be sure that what you’re looking at now is the same as what you created before. In cloud environments, hashing helps verify that virtual machine instances haven’t been modified (maliciously or accidentally) without your knowledge. Simply hash your VM image before running it and compare it to the hash of the known-good VM image; the hash outputs should be identical.\r\n<p class=\"article-tips warning\">The term hashing is sometimes used interchangeably with encryption, but they are very different! Encryption is a two-way function, meaning what can be encrypted can be decrypted. Conversely, hashing is a one-way function. You can only generate a hash of an object; you cannot retrieve an object from its hash. Encryption, again, is used to provide confidentiality, while hashing provides integrity checking. Be careful not to confuse these two terms!</p>\r\nSeveral hashing algorithms are available, but the SHA (Secure Hash Algorithm) family of algorithms are amongst the most popular. Specific algorithms are outside the scope of this book, but you can research SHA-1, SHA-2, and SHA-3 for additional context.\r\n<h2 id=\"tab3\" >Data Loss Prevention (DLP)</h2>\r\n<em>Data loss prevention </em>(DLP), also known as data leakage prevention, is the set of technologies and practices used to identify and classify sensitive data, while ensuring that sensitive data is not lost or accessed by unauthorized parties.\r\n\r\n[caption id=\"attachment_274157\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274157\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-loss-prevention.jpg\" alt=\"Data Loss Prevention (DLP).\" width=\"556\" height=\"88\" /> Data Loss Prevention (DLP).[/caption]\r\n\r\nDLP can be applied to help restrict the flow of both structured and unstructured data to authorized locations and users. Effective use of DLP goes a long way to helping organizations safeguard their data’s confidentiality, both on-prem and in the cloud. To put it plainly, DLP analyzes data storage, identifies sensitive data components, and prevents users from accidentally or maliciously sending that sensitive data to the wrong party.\r\n\r\nWhen designing a DLP strategy, organizations must consider how the technology fits in with their existing technologies, processes, and architecture. DLP controls need to be thoroughly understood and applied in a manner that aligns with the organization’s overall enterprise architecture in order to ensure that only the right type of data is blocked from being transmitted.\r\n\r\nHybrid cloud users, or users that utilize a combination of cloud-based and on-prem services, should pay extremely close attention to their enterprise security architecture while developing a DLP strategy. Because data traverses both cloud and noncloud environments, a poor DLP implementation can result in segmented data security policies that are hard to manage and ineffective.\r\n<p class=\"article-tips remember\">DLP that is incorrectly implemented can lead to false-positives (for example, blocking legitimate traffic) or false-negatives (allowing sensitive data to be sent to unauthorized parties).</p>\r\nDLP implementations consist of three core components or stages:\r\n<ul>\r\n \t<li><strong>Discovery and classification:</strong> The first stage of DLP is discovery and classification. <em>Discovery</em> is the process of finding all instances of data, and <em>classification</em> is the act of categorizing that data based on its sensitivity and other characteristics. Examples of classifications may include “credit card data,” “Social Security numbers,” “health records,” and so on. Comprehensive discovery and proper classification is crucial to success during the remaining DLP stages.</li>\r\n \t<li><strong>Monitoring:</strong> After data has been fully discovered and classified, it is able to be monitored. Monitoring is an essential component of the DLP implementation and involves watching data as it moves throughout the cloud data lifecycle. The monitoring stage is where the DLP implementation is looking to identify data that is being misused or handled outside of established usage policies. Effective DLP monitoring should happen on storage devices, networking devices, servers, workstations, and other endpoints — and it should evaluate traffic across all potential export routes (email, Internet browsers, and so on).</li>\r\n \t<li><strong>Enforcement:</strong> The final DLP stage, enforcement, is where action is taken on policy violations identified during the monitoring stage. These actions are configured based on the classification of data and the potential impact of its loss. Violations of less sensitive data is traditionally logged and/or alerted on, while more sensitive data can actually be blocked from unauthorized exposure or loss. A common use-case here is financial services companies that detect credit card numbers being emailed to unauthorized domains and are able to stop the email in its tracks, before it ever leaves the corporate network.</li>\r\n</ul>\r\nAlways remember “Security follows the data” — and DLP technology is no different. When creating a DLP implementation strategy, it’s important that you consider techniques for monitoring activity in every data state. DLP data states are\r\n<ul>\r\n \t<li><strong>DLP at rest:</strong> For data at rest, the DLP implementation is stored wherever the data is stored, such as a workstation, file server, or some other form of storage system. Although this DLP implementation is often the simplest, it may need to work in conjunction with other DLP implementations to be most effective.</li>\r\n \t<li><strong>DLP in transit:</strong> <em>Network-based DLP</em> is data loss prevention that involves monitoring outbound traffic near the network perimeter. This DLP implementation monitors traffic over Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP), and other protocols.</li>\r\n</ul>\r\n<p class=\"article-tips warning\">If the network traffic being monitored is encrypted, you will need to integrate encryption and key management technologies into your DLP solution. Standard DLP implementations cannot effectively monitor encrypted traffic, such as HTTPS.</p>\r\n\r\n<ul>\r\n \t<li><strong>DLP in use:</strong> <em>Host-based,</em> or <em>endpoint-based, DLP</em> is data loss prevention that involves installation of a DLP application on a workstation or other endpoint device. This DLP implementation allows monitoring of all data in use on the client device and provides insights that network-based DLP are not able to provide.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">Because of the massive scale of many cloud environments, host-based DLP can be a major challenge. There are simply too many hosts and endpoints to monitor without a sophisticated strategy that involves automated deployment. Despite this challenge, host-based DLP is not impossible in the cloud, and CSPs continue to make monitoring easier as new cloud-native DLP features become available.</p>\r\nAfter you understand DLP and how it can be used to protect cloud data, there are a few considerations that cloud security professionals commonly face when implementing cloud-based DLP:\r\n<ul>\r\n \t<li>Cloud data is highly distributed and replicated across locations. Data can move between servers, from one data center to another, to and from backup storage, or between a customer and the cloud provider. This movement, along with the data replication that ensures availability, present challenges that need to be worked through in a DLP strategy.</li>\r\n \t<li>DLP technologies can impact performance. Host-based DLP scan all data access activities on an endpoint, and network-based DLP scan all outbound network traffic across a network boundary. This constant monitoring and scanning can impact system and network performance and must be considered while developing and testing your DLP strategy.</li>\r\n \t<li>Cloud-based DLP can get expensive. The pay-for-what-you-use model is often a great savings to cloud customers, but when it comes to DLP, the constant resource utilization associated with monitoring traffic can quickly add up. It’s important to model and plan for resource consumption costs on top of the costs of the DLP solution itself.</li>\r\n</ul>\r\n<h2 id=\"tab4\" >Data de-identification</h2>\r\nConfidentiality is incredibly important, especially in the cloud. While mechanisms like encryption and DLP go a long way to providing data confidentiality, they’re not always feasible. <em>Data de-identification</em> (or <em>anonymization</em>) is the process of removing information that can be used to identify a specific individual from a dataset. This technique is commonly used as a privacy measure to protect Personally Identifiable Information (PII) or other sensitive information from being exposed when an entire dataset is shared. The following figure depicts the purest form of data de-identification; in this example, student names have been removed in order to protect the confidentiality of their grades.\r\n\r\nSeveral techniques are available to de-identify sensitive information; masking (or obfuscation) and tokenization are two of the most commonly used methods.\r\n\r\n[caption id=\"attachment_274156\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274156\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-de-identification.jpg\" alt=\"Data de-identification.\" width=\"556\" height=\"158\" /> Data de-identification.[/caption]\r\n<h3>Masking</h3>\r\n<em>Masking</em> is the process of partially or completely replacing sensitive data with random characters or other nonsensitive data. Masking, or <em>obfuscation, </em>can happen in a number of ways, but the following figure is a visual depiction of the most popular type of data masking, which is commonly used to protect credit card numbers and other sensitive financial information.\r\n\r\n[caption id=\"attachment_274155\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274155\" src=\"//coursofppt.com/wp-content/uploads/ccsp-data-masking.jpg\" alt=\"Data masking.\" width=\"556\" height=\"205\" /> Data masking.[/caption]\r\n\r\nAs a cloud security professional, you can use several techniques when masking or obfuscating data. Here are a few to remember:\r\n<ul>\r\n \t<li><strong>Substitution:</strong> <em>Substitution</em> mimics the look of real data, but replaces (or appends) it with some unrelated value. Substitution can either be random or algorithmic, with the latter allowing two-way substitution — meaning if you have the algorithm, then you can retrieve the original data from the masked dataset.</li>\r\n \t<li><strong>Scrambling:</strong> <em>Scrambling</em> mimics the look of real data, but simply jumbles the characters into a random order. For example, a customer’s whose account number is #5551234 may be shown as #1552435 in a development environment. (For what it’s worth, my scrambled phone number is 0926381135.)</li>\r\n \t<li><strong>Deletion or nulling:</strong> This technique is just what it sounds like. When using this masking technique, data appears blank or empty to anyone who isn’t authorized to view it.</li>\r\n</ul>\r\nAside from being used to comply with regulatory regulations (like HIPAA or PCI DSS), data masking is often used when organizations need to use production data in a test or development environment. By masking the data, development environments are able to use real data without exposing sensitive data elements to unauthorized viewers or less secure environments.\r\n<h3>Tokenization</h3>\r\n<em>Tokenization</em> is the process of substituting a sensitive piece of data with a nonsensitive replacement, called a <em>token.</em> The token is merely a reference back to the sensitive data, but has no meaning or sensitivity on its own. The token maintains the look and feel of the original data and is mapped back to the original data by the tokenization engine or application. Tokenization allows code to continue to run seamlessly, even with randomized tokens in place of sensitive data.\r\n<p class=\"article-tips tip\"><em>Tokenization</em> can be outsourced to external, cloud-based tokenization services (referred to as tokenization-as-a-service). When using these services, it’s prudent to understand how the provider secures your data both at rest and in transit between you and their systems.</p>","blurb":"","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"primaryCategoryTaxonomy":{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"}},"secondaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Encryption and key management","target":"#tab1"},{"label":"Hashing","target":"#tab2"},{"label":"Data Loss Prevention (DLP)","target":"#tab3"},{"label":"Data de-identification","target":"#tab4"}],"relatedArticles":{"fromBook":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}],"fromCategory":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281662,"slug":"ccsp-for-dummies-with-online-practice","isbn":"9781394212811","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"amazon":{"default":"//www.amazon.com/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421281X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/ccsp-for-dummies-2nd-edition-cover-9781394212811-203x255.jpg","width":203,"height":255},"title":"CCSP For Dummies","testBankPinActivationLink":"//coursofppt.com/go/fdactivatepin","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"33440\">Arthur J. Deane</b></b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.</p>","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-658380490b5e9\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-658380490bc8a\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-12-20T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":274154},{"headers":{"creationTime":"2021-10-28T00:22:49+00:00","modifiedTime":"2024-12-20T21:01:44+00:00","timestamp":"2024-12-21T00:01:12+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"CCSP","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"slug":"ccsp","categoryId":34392}],"title":"CCSP Exam and Virtualization","strippedTitle":"ccsp exam and virtualization","slug":"ccsp-exam-and-virtualization","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"To prepare for the CCSP exam, learn about virtualization, which is the process of creating software instances of actual hardware.","noIndex":0,"noFollow":0},"content":"Domain 3, which includes cloud platform and infrastructure security, represents 17 percent of the <a href=\"//coursofppt.com/article/academics-the-arts/study-skills-test-prep/ccsp/ccsp-for-dummies-cheat-sheet-273450/\">CCSP certification exam</a>. <em>Virtualization</em> is the process of creating software instances of actual hardware. VMs, for example, are software instances of actual computers. Software-Defined Networks are virtualized networks. Nowadays, you can pretty much find any traditional hardware available as a virtualized solution.\r\n\r\nVirtualization is the secret sauce behind cloud computing, as it allows a single piece of hardware to be shared by multiple customers. Concepts like multitenancy and resource pooling would not exist as they do today — and you wouldn’t be reading this book — if it weren’t for the advent of virtualization!\r\n\r\nVirtualization offers many clear benefits. Following is a list of some of the most noteworthy:\r\n<ul>\r\n \t<li><strong>Increases scalability:</strong> Virtualized environments are designed to grow as your demand grows. Instead of buying new hardware, you simply spin up additional virtual instances.</li>\r\n \t<li><strong>Allows faster resource provisioning:</strong> It’s much quicker and easier to spin up virtualized hardware from a console than it is to physically boot-up multiple pieces of hardware.</li>\r\n \t<li><strong>Reduces downtime:</strong> Restoring or redeploying physical hardware takes a lot of time, especially at scale. Failover for virtualized resources can happen much more quickly, which means your systems remain up and running longer.</li>\r\n \t<li><strong>Avoids vendor lock-in:</strong> Virtualization abstracts software from hardware, meaning your virtualized resources are more portable than their physical counterparts. Unhappy with your vendor? Pack up your VMs and move to another one!</li>\r\n \t<li><strong>Saves</strong> <strong>time (and money):</strong> Virtualized resources can be easily centrally managed, reducing the need for personnel and equipment to maintain your infrastructure. In addition, less hardware usually means less money.</li>\r\n</ul>\r\nThe preceding list reiterates why virtualization is such a critical technology and reminds you of the deep connection between virtualization and cloud computing.\r\n\r\nThe most common implementation of virtualization is the hypervisor. A hypervisor is a computing layer that allows multiple guest Operating Systems to run on a single physical host device. The following figure shows an overview of hypervisor architecture.\r\n\r\n[caption id=\"attachment_274169\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274169\" src=\"//coursofppt.com/wp-content/uploads/ccsp-virtualization.jpg\" alt=\"hypervisor\" width=\"556\" height=\"404\" /> Hypervisor overview.[/caption]\r\n\r\nThe hypervisor abstracts software from hardware and allows each of the guest OSes to share the host’s hardware resources, while giving the guests the impression that they’re all alone on that host. The two categories of hypervisors are Type 1 and Type 2. A Type 1 hypervisor is also known as a bare metal hypervisor, as it runs directly on the hardware. Type 2 hypervisors, however, run on the host’s Operating System. This figure shows a comparison of the two.\r\n\r\n[caption id=\"attachment_274168\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274168\" src=\"//coursofppt.com/wp-content/uploads/ccsp-hypervisor-comparison.jpg\" alt=\"hypervisor comparison\" width=\"556\" height=\"541\" /> Type 1 versus Type 2 hypervisors.[/caption]\r\n\r\nDespite all the advantages of virtualization, and hypervisors specifically, you, as a CCSP candidate, should remember some challenges:\r\n<ul>\r\n \t<li><strong>Hypervisor security:</strong> The hypervisor is an additional piece of software, hardware, or firmware that sits between the host and each guest. As a result, it expands the attack surface and comes with its own set of vulnerabilities that the good guys must discover and patch before the bad guys get to them. If not fixed, hypervisor flaws can lead to external attacks on VMs or even VM-to-VM attacks, where one cloud tenant can access or compromise another tenant’s data.</li>\r\n \t<li><strong>VM security:</strong> Virtual machines are nothing more than files that sit on a disk or other storage mechanism. Imagine your entire home computer wrapped up into a single icon that sits on your desktop — that’s pretty much what a virtual machine comes down to. If not sufficiently protected, a VM image is susceptible to compromise while dormant or offline. Use controls like Access Control Lists (ACLs), encryption, and hashing to protect the confidentiality and integrity of your VM files.</li>\r\n \t<li><strong>Network security:</strong> Network traffic within virtualized environments cannot be monitored and protected by physical security controls, such as network-based intrusion detection systems. You must select appropriate tools to monitor inter- and intra-VM network traffic.</li>\r\n</ul>\r\n<p class=\"article-tips tech\">The concept of <em>virtual machine introspection</em> (VMI) allows a hypervisor to monitor its guest Operating Systems during runtime. Not all hypervisors are capable of VMI, but it’s a technique that can prove invaluable for securing VMs during operation.</p>\r\n\r\n<ul>\r\n \t<li><strong>Resource utilization:</strong> If not properly configured, a single VM can exhaust a host’s resources, leaving other VMs out of luck. Resource utilization is where the concept of limits (discussed in the “Reservations, limits, and shares” section of this chapter) comes in handy. It’s essential that you manage VMs as if they share a pool of resources — because they do!</li>\r\n</ul>","description":"Domain 3, which includes cloud platform and infrastructure security, represents 17 percent of the <a href=\"//coursofppt.com/article/academics-the-arts/study-skills-test-prep/ccsp/ccsp-for-dummies-cheat-sheet-273450/\">CCSP certification exam</a>. <em>Virtualization</em> is the process of creating software instances of actual hardware. VMs, for example, are software instances of actual computers. Software-Defined Networks are virtualized networks. Nowadays, you can pretty much find any traditional hardware available as a virtualized solution.\r\n\r\nVirtualization is the secret sauce behind cloud computing, as it allows a single piece of hardware to be shared by multiple customers. Concepts like multitenancy and resource pooling would not exist as they do today — and you wouldn’t be reading this book — if it weren’t for the advent of virtualization!\r\n\r\nVirtualization offers many clear benefits. Following is a list of some of the most noteworthy:\r\n<ul>\r\n \t<li><strong>Increases scalability:</strong> Virtualized environments are designed to grow as your demand grows. Instead of buying new hardware, you simply spin up additional virtual instances.</li>\r\n \t<li><strong>Allows faster resource provisioning:</strong> It’s much quicker and easier to spin up virtualized hardware from a console than it is to physically boot-up multiple pieces of hardware.</li>\r\n \t<li><strong>Reduces downtime:</strong> Restoring or redeploying physical hardware takes a lot of time, especially at scale. Failover for virtualized resources can happen much more quickly, which means your systems remain up and running longer.</li>\r\n \t<li><strong>Avoids vendor lock-in:</strong> Virtualization abstracts software from hardware, meaning your virtualized resources are more portable than their physical counterparts. Unhappy with your vendor? Pack up your VMs and move to another one!</li>\r\n \t<li><strong>Saves</strong> <strong>time (and money):</strong> Virtualized resources can be easily centrally managed, reducing the need for personnel and equipment to maintain your infrastructure. In addition, less hardware usually means less money.</li>\r\n</ul>\r\nThe preceding list reiterates why virtualization is such a critical technology and reminds you of the deep connection between virtualization and cloud computing.\r\n\r\nThe most common implementation of virtualization is the hypervisor. A hypervisor is a computing layer that allows multiple guest Operating Systems to run on a single physical host device. The following figure shows an overview of hypervisor architecture.\r\n\r\n[caption id=\"attachment_274169\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274169\" src=\"//coursofppt.com/wp-content/uploads/ccsp-virtualization.jpg\" alt=\"hypervisor\" width=\"556\" height=\"404\" /> Hypervisor overview.[/caption]\r\n\r\nThe hypervisor abstracts software from hardware and allows each of the guest OSes to share the host’s hardware resources, while giving the guests the impression that they’re all alone on that host. The two categories of hypervisors are Type 1 and Type 2. A Type 1 hypervisor is also known as a bare metal hypervisor, as it runs directly on the hardware. Type 2 hypervisors, however, run on the host’s Operating System. This figure shows a comparison of the two.\r\n\r\n[caption id=\"attachment_274168\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-274168\" src=\"//coursofppt.com/wp-content/uploads/ccsp-hypervisor-comparison.jpg\" alt=\"hypervisor comparison\" width=\"556\" height=\"541\" /> Type 1 versus Type 2 hypervisors.[/caption]\r\n\r\nDespite all the advantages of virtualization, and hypervisors specifically, you, as a CCSP candidate, should remember some challenges:\r\n<ul>\r\n \t<li><strong>Hypervisor security:</strong> The hypervisor is an additional piece of software, hardware, or firmware that sits between the host and each guest. As a result, it expands the attack surface and comes with its own set of vulnerabilities that the good guys must discover and patch before the bad guys get to them. If not fixed, hypervisor flaws can lead to external attacks on VMs or even VM-to-VM attacks, where one cloud tenant can access or compromise another tenant’s data.</li>\r\n \t<li><strong>VM security:</strong> Virtual machines are nothing more than files that sit on a disk or other storage mechanism. Imagine your entire home computer wrapped up into a single icon that sits on your desktop — that’s pretty much what a virtual machine comes down to. If not sufficiently protected, a VM image is susceptible to compromise while dormant or offline. Use controls like Access Control Lists (ACLs), encryption, and hashing to protect the confidentiality and integrity of your VM files.</li>\r\n \t<li><strong>Network security:</strong> Network traffic within virtualized environments cannot be monitored and protected by physical security controls, such as network-based intrusion detection systems. You must select appropriate tools to monitor inter- and intra-VM network traffic.</li>\r\n</ul>\r\n<p class=\"article-tips tech\">The concept of <em>virtual machine introspection</em> (VMI) allows a hypervisor to monitor its guest Operating Systems during runtime. Not all hypervisors are capable of VMI, but it’s a technique that can prove invaluable for securing VMs during operation.</p>\r\n\r\n<ul>\r\n \t<li><strong>Resource utilization:</strong> If not properly configured, a single VM can exhaust a host’s resources, leaving other VMs out of luck. Resource utilization is where the concept of limits (discussed in the “Reservations, limits, and shares” section of this chapter) comes in handy. It’s essential that you manage VMs as if they share a pool of resources — because they do!</li>\r\n</ul>","blurb":"","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"primaryCategoryTaxonomy":{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"}},"secondaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}],"fromCategory":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281662,"slug":"ccsp-for-dummies-with-online-practice","isbn":"9781394212811","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"amazon":{"default":"//www.amazon.com/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421281X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/ccsp-for-dummies-2nd-edition-cover-9781394212811-203x255.jpg","width":203,"height":255},"title":"CCSP For Dummies","testBankPinActivationLink":"//coursofppt.com/go/fdactivatepin","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"33440\">Arthur J. Deane</b></b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.</p>","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65838048f0e88\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65838048f1f74\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-12-20T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":274167},{"headers":{"creationTime":"2021-10-28T01:14:02+00:00","modifiedTime":"2024-12-20T20:40:13+00:00","timestamp":"2024-12-20T21:01:11+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"CCSP","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"slug":"ccsp","categoryId":34392}],"title":"The Secure Software Development Lifecycle (SDLC) Process","strippedTitle":"the secure software development lifecycle (sdlc) process","slug":"the-secure-software-development-lifecycle-sdlc-process","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"Get an overview of the Secure Software Development Lifecycle process, which you need to know to pass the CCSP certification exam.","noIndex":0,"noFollow":0},"content":"The Secure Software Development Lifecycle process is covered under Domain 4, which represents 17 percent of the CCSP certification exam. Streamlined and secure application development requires a consistent methodology and a well-defined process of getting from concept to finished product. SDLC is the series of steps that is followed to build, modify, and maintain computing software.\r\n<h2 id=\"tab1\" >Business requirements</h2>\r\nYour organization’s business requirements should be a key consideration whenever you develop new software or even when you modify existing applications. You should make sure that you have a firm understanding of your organization’s goals (overall and specific to your project) and knowledge of the end-user’s needs and expectations.\r\n\r\nIt’s important to gather input from as many stakeholders as possible as early as possible to support the success of your application. Gathering requirements from relevant leaders and business units across your organization is crucial to ensuring that you don’t waste development cycles on applications or features that don’t meet the needs of your business.\r\n\r\nThese business requirements are a critical input into the SDLC.\r\n<h2 id=\"tab2\" >SDLC phases</h2>\r\nWhile the SDLC process has multiple different variations, it most commonly includes the steps, or phases:\r\n<ul>\r\n \t<li>Planning</li>\r\n \t<li>Defining</li>\r\n \t<li>Designing</li>\r\n \t<li>Developing</li>\r\n \t<li>Testing</li>\r\n \t<li>Deploying and maintaining</li>\r\n</ul>\r\n<img class=\"aligncenter size-full wp-image-301274\" src=\"//coursofppt.com/wp-content/uploads/9781394212811-cs03.jpg\" alt=\"diagram showing the software development lifecyle overview\" width=\"394\" height=\"400\" />\r\n<p class=\"article-tips tip\">There’s a good chance that you will see at least one question related to the SDLC on your exam. Remember that the titles of each phase may vary slightly from one methodology to the next, but make sure that you have a strong understanding of the overall flow and the order of operations.</p>\r\n<p class=\"article-tips remember\">Although none of the stages specifically reference security, it is important that you consider security at each and every step of the SDLC process. Waiting until later stages of the process can introduce unnecessary security risks, which can add unforeseen costs and extend your project timeline.</p>\r\n\r\n<h3>SDLC Planning phase</h3>\r\nThe Planning phase is the most fundamental stage of the SDLC and is sometimes called Requirements Gathering. During this initial phase, the project scope is established and high-level requirements are gathered to support the remaining lifecycle phases. The project team should work with senior leadership and all project stakeholders to create the overall project timeline and identify project costs and resources required.\r\n\r\nDuring the Planning phase, you must consider all requirements and desired features and conduct a cost-benefit analysis to determine the potential financial impact versus the proposed value to the end-user. Using all the information that you gather during this phase, you should then validate the economic and technical feasibility of proceeding with the project.\r\n\r\nThe Planning phase is where risks should initially be identified. Your project team should consider what may go wrong and how you can mitigate, or lower, the impact of those risks. For example, imagine that you’re building an online banking application. As part of the Planning phase, you should not only consider all functional requirements of such an application, but also security and compliance requirements, such as satisfying PCI DSS. Consider what risks currently exist within your organization (or your cloud environment) that might get in the way of demonstrating PCI DSS and then plan ways to address those risks.\r\n<h3>SDLC Defining phase</h3>\r\nYou may also see this phase referred to as Requirements Analysis. During the Defining phase, you use all the business requirements, feasibility studies, and stakeholder input from the Planning phase to document clearly defined product requirements. Your product requirements should provide full details of the specific features and functionality of your proposed application. These requirements will ultimately feed your design decisions, so it needs to be as thorough as possible.\r\n\r\nIn addition, during this phase you must define the specific hardware and software requirements required for your development team — identify what type of dev environment is needed, designate your programming language, and define all technical resources needed to complete the project.\r\n<p class=\"article-tips tip\">This phase is where you should specifically define all your application security requirements and identify the tools and resources necessary to develop those accordingly. You should be thinking about where encryption is required, what type of access control features are needed, and what requirements you have for maintaining your code’s integrity.</p>\r\n\r\n<h3>SDLC Designing phase</h3>\r\nThe Designing phase is where you take your product requirements and software specifications and turn them into an actual design plan, often called a <em>design specification document</em>. This design plan is then used during the next phase to guide the actual development and implementation of your application.\r\n\r\nDuring the Designing phase, your developers, systems architects, and other technical staff create the high-level system and software design to meet each identified requirement. Your mission during this phase is to design the overall software architecture and create a plan that identifies the technical details of your application’s design. In cloud development, this phase includes defining the required amount of CPU cores, RAM, and bandwidth, while also identifying which cloud services are required for full functionality of your application. This component is critical because it may identify a need for your organization to provision additional cloud resources. Your design should define all software components that need to be created, interconnections with third-party systems, the front-end user interface, and all data flows (both within the application and between users and the application).\r\n\r\nAt this stage of the SDLC, you should also conduct threat modeling exercises and integrate your risk mitigation decisions (from the Planning phase) into your formal designs. In other words, you want to fully identify potential risks.\r\n<h3>SDLC Developing phase</h3>\r\nSoftware developers, rejoice! After weeks or even months of project planning, you can finally write some code! During this phase of the SDLC, your development team breaks up the work documented in previous steps into pieces (or modules) that are coded individually. Database developers create the required data storage architecture, front-end developers create the interface that users will interact with, and back-end developers code all the behind-the-scenes inner-workings of the application. This phase is typically the longest of the SDLC, but if the previous steps are followed carefully, it can be the least complicated part of the whole process.\r\n\r\nDuring this phase, developers should conduct peer reviews of each other’s code to check for flaws, and each individual module should be unit tested to verify its functionality prior to being rolled into the larger project. Some development teams skip this part and struggle mightily to debug flaws once an application is completed.\r\n\r\nIn addition to conducting functional testing of each module, the time is right to begin security testing. Your organization should conduct static code analysis and security scanning of each module before integration into the project. Failure to do so may allow individual software vulnerabilities to get lost in the overall codebase, and multiple individual security flaws may combine to present a larger aggregate risk, or combined risk.\r\n<h3>SDLA Testing phase</h3>\r\nOnce the code is fully developed, the application enters the Testing phase. During this phase, application testers seek to verify whether the application functions as desired and according to the documented requirements; the ultimate goal here is to uncover all flaws within the application and report those flaws to the developers for patching. This cyclical process continues until all product requirements have been validated and all flaws have been fixed.\r\n\r\nAs a completed application, security testers have more tools at their disposal to uncover security flaws. Instead of relying solely on static code analysis, testers can use dynamic analysis to identify flaws that occur only when the code is executed.\r\n<p class=\"article-tips tip\">The Testing phase is one of the most crucial phases of the SDLC, as it is the main gate between your development team and customers. Testing should be conducted in accordance with an application testing plan that identifies what and how to test. Management and relevant stakeholders should carefully review and approve your testing plan before testing begins.</p>\r\n\r\n<h3>Deploying and maintaining</h3>\r\nOnce the application has passed the Testing phase, it is ready to be deployed for customer use. There are often multiple stages of deployment (Alpha, Beta, and General Availability are common ones), each with its own breadth of deployment (for example, alpha releases tend to be deployed to select customers, whereas general availability means it’s ready for everyone).\r\n\r\nOnce applications have been tested and successfully deployed, they enter a maintenance phase where they’re continually monitored and updated. During the Maintaining phase, the production software undergoes an ongoing cycle of the SDLC process, where security patches and other updates go through the same planning, defining, designing, developing, testing, and deploying activities discussed in the preceding sections.\r\n\r\nMany SDLC models include a separate phase for disposal or termination, which happens when an application is no longer needed or supported. From a security perspective, you should keep in mind that data (including portions of applications) may remain in cloud environments even after deletion. Consult your contracts and SLAs for commitments that your CSP makes for data deletion.\r\n<h2 id=\"tab3\" >Methodologies</h2>\r\nAlthough the steps within the SDLC remain largely constant, several SDLC methodologies, or models, exist, and each approaches these steps in slightly different ways. Two of the most commonly referenced and used methodologies are waterfall and agile.\r\n<h3>Waterfall</h3>\r\n<em>Waterfall</em> is the oldest and most straightforward SDLC methodology. In this model, you complete one phase and then continue on to the next — you move in sequential order, flowing through every step of the cycle from beginning to end. Each phase of this model relies on successful completion of the previous phase; there’s no going back, because... well, because waterfalls don’t flow up.\r\n\r\nSome advantages of the waterfall methodology include\r\n<ul>\r\n \t<li>It’s simple to manage and easy to follow.</li>\r\n \t<li>Tracking and measuring progress is easy because you have a clearly defined end state early on.</li>\r\n \t<li>The measure twice, cut once approach allows applications to be developed based upon a more complete understanding of all requirements and deliverables from the start.</li>\r\n \t<li>The process can largely occur without customer intervention after requirements are initially gathered. Customers and developers agree on desired outcomes early in the project.</li>\r\n</ul>\r\nSome challenges that come with waterfall include\r\n<ul>\r\n \t<li>It’s rigid. Requirements must be fully developed early in the process and are difficult to change once the design has been completed.</li>\r\n \t<li>Products may take longer to deliver compared to more iterative models, like agile.</li>\r\n \t<li>It relies very little on the customer or end-user, which may make some customers feel left out.</li>\r\n \t<li>Testing is delayed until late in the process, which may allow small issues to build up into larger ones before they’re detected.</li>\r\n</ul>\r\n<h3>Agile</h3>\r\n<em>Agile</em> is more of the new kid on the block, having been introduced in the 1990s. In this model, instead of proceeding in a linear and sequential fashion, development and testing activities occur simultaneously and cyclically.\r\n\r\nApplication development is separated into <em>sprints</em> that produce a succession of releases that each improves upon the previous release. With the agile model, the goal is to move quickly and to fail fast — create your first release, test it, fix it, and create your next release fast!\r\n\r\nSome advantages of the agile methodology include\r\n<ul>\r\n \t<li>It’s flexible. You can move from one phase to the next without worrying that the previous phase isn’t perfect or complete.</li>\r\n \t<li>Time to market is much quicker than waterfall.</li>\r\n \t<li>It’s very user-focused; the customer has frequent opportunities to give feedback on the application.</li>\r\n \t<li>Risks may be reduced because the iterative nature of agile allows you get feedback and conduct testing early and often.</li>\r\n</ul>\r\nSome challenges that come with Agile include\r\n<ul>\r\n \t<li>It can be challenging to apply in real-life projects, especially larger projects with many stakeholders and components.</li>\r\n \t<li>The product end-state is less predictable than waterfall. With agile, you iterate until you’re happy with the result.</li>\r\n \t<li>It requires a very high level of collaboration and frequent communication between developers, customers, and other stakeholders. This challenge can be a pro, but sometimes has a negative impact on developers and project timelines.</li>\r\n</ul>","description":"The Secure Software Development Lifecycle process is covered under Domain 4, which represents 17 percent of the CCSP certification exam. Streamlined and secure application development requires a consistent methodology and a well-defined process of getting from concept to finished product. SDLC is the series of steps that is followed to build, modify, and maintain computing software.\r\n<h2 id=\"tab1\" >Business requirements</h2>\r\nYour organization’s business requirements should be a key consideration whenever you develop new software or even when you modify existing applications. You should make sure that you have a firm understanding of your organization’s goals (overall and specific to your project) and knowledge of the end-user’s needs and expectations.\r\n\r\nIt’s important to gather input from as many stakeholders as possible as early as possible to support the success of your application. Gathering requirements from relevant leaders and business units across your organization is crucial to ensuring that you don’t waste development cycles on applications or features that don’t meet the needs of your business.\r\n\r\nThese business requirements are a critical input into the SDLC.\r\n<h2 id=\"tab2\" >SDLC phases</h2>\r\nWhile the SDLC process has multiple different variations, it most commonly includes the steps, or phases:\r\n<ul>\r\n \t<li>Planning</li>\r\n \t<li>Defining</li>\r\n \t<li>Designing</li>\r\n \t<li>Developing</li>\r\n \t<li>Testing</li>\r\n \t<li>Deploying and maintaining</li>\r\n</ul>\r\n<img class=\"aligncenter size-full wp-image-301274\" src=\"//coursofppt.com/wp-content/uploads/9781394212811-cs03.jpg\" alt=\"diagram showing the software development lifecyle overview\" width=\"394\" height=\"400\" />\r\n<p class=\"article-tips tip\">There’s a good chance that you will see at least one question related to the SDLC on your exam. Remember that the titles of each phase may vary slightly from one methodology to the next, but make sure that you have a strong understanding of the overall flow and the order of operations.</p>\r\n<p class=\"article-tips remember\">Although none of the stages specifically reference security, it is important that you consider security at each and every step of the SDLC process. Waiting until later stages of the process can introduce unnecessary security risks, which can add unforeseen costs and extend your project timeline.</p>\r\n\r\n<h3>SDLC Planning phase</h3>\r\nThe Planning phase is the most fundamental stage of the SDLC and is sometimes called Requirements Gathering. During this initial phase, the project scope is established and high-level requirements are gathered to support the remaining lifecycle phases. The project team should work with senior leadership and all project stakeholders to create the overall project timeline and identify project costs and resources required.\r\n\r\nDuring the Planning phase, you must consider all requirements and desired features and conduct a cost-benefit analysis to determine the potential financial impact versus the proposed value to the end-user. Using all the information that you gather during this phase, you should then validate the economic and technical feasibility of proceeding with the project.\r\n\r\nThe Planning phase is where risks should initially be identified. Your project team should consider what may go wrong and how you can mitigate, or lower, the impact of those risks. For example, imagine that you’re building an online banking application. As part of the Planning phase, you should not only consider all functional requirements of such an application, but also security and compliance requirements, such as satisfying PCI DSS. Consider what risks currently exist within your organization (or your cloud environment) that might get in the way of demonstrating PCI DSS and then plan ways to address those risks.\r\n<h3>SDLC Defining phase</h3>\r\nYou may also see this phase referred to as Requirements Analysis. During the Defining phase, you use all the business requirements, feasibility studies, and stakeholder input from the Planning phase to document clearly defined product requirements. Your product requirements should provide full details of the specific features and functionality of your proposed application. These requirements will ultimately feed your design decisions, so it needs to be as thorough as possible.\r\n\r\nIn addition, during this phase you must define the specific hardware and software requirements required for your development team — identify what type of dev environment is needed, designate your programming language, and define all technical resources needed to complete the project.\r\n<p class=\"article-tips tip\">This phase is where you should specifically define all your application security requirements and identify the tools and resources necessary to develop those accordingly. You should be thinking about where encryption is required, what type of access control features are needed, and what requirements you have for maintaining your code’s integrity.</p>\r\n\r\n<h3>SDLC Designing phase</h3>\r\nThe Designing phase is where you take your product requirements and software specifications and turn them into an actual design plan, often called a <em>design specification document</em>. This design plan is then used during the next phase to guide the actual development and implementation of your application.\r\n\r\nDuring the Designing phase, your developers, systems architects, and other technical staff create the high-level system and software design to meet each identified requirement. Your mission during this phase is to design the overall software architecture and create a plan that identifies the technical details of your application’s design. In cloud development, this phase includes defining the required amount of CPU cores, RAM, and bandwidth, while also identifying which cloud services are required for full functionality of your application. This component is critical because it may identify a need for your organization to provision additional cloud resources. Your design should define all software components that need to be created, interconnections with third-party systems, the front-end user interface, and all data flows (both within the application and between users and the application).\r\n\r\nAt this stage of the SDLC, you should also conduct threat modeling exercises and integrate your risk mitigation decisions (from the Planning phase) into your formal designs. In other words, you want to fully identify potential risks.\r\n<h3>SDLC Developing phase</h3>\r\nSoftware developers, rejoice! After weeks or even months of project planning, you can finally write some code! During this phase of the SDLC, your development team breaks up the work documented in previous steps into pieces (or modules) that are coded individually. Database developers create the required data storage architecture, front-end developers create the interface that users will interact with, and back-end developers code all the behind-the-scenes inner-workings of the application. This phase is typically the longest of the SDLC, but if the previous steps are followed carefully, it can be the least complicated part of the whole process.\r\n\r\nDuring this phase, developers should conduct peer reviews of each other’s code to check for flaws, and each individual module should be unit tested to verify its functionality prior to being rolled into the larger project. Some development teams skip this part and struggle mightily to debug flaws once an application is completed.\r\n\r\nIn addition to conducting functional testing of each module, the time is right to begin security testing. Your organization should conduct static code analysis and security scanning of each module before integration into the project. Failure to do so may allow individual software vulnerabilities to get lost in the overall codebase, and multiple individual security flaws may combine to present a larger aggregate risk, or combined risk.\r\n<h3>SDLA Testing phase</h3>\r\nOnce the code is fully developed, the application enters the Testing phase. During this phase, application testers seek to verify whether the application functions as desired and according to the documented requirements; the ultimate goal here is to uncover all flaws within the application and report those flaws to the developers for patching. This cyclical process continues until all product requirements have been validated and all flaws have been fixed.\r\n\r\nAs a completed application, security testers have more tools at their disposal to uncover security flaws. Instead of relying solely on static code analysis, testers can use dynamic analysis to identify flaws that occur only when the code is executed.\r\n<p class=\"article-tips tip\">The Testing phase is one of the most crucial phases of the SDLC, as it is the main gate between your development team and customers. Testing should be conducted in accordance with an application testing plan that identifies what and how to test. Management and relevant stakeholders should carefully review and approve your testing plan before testing begins.</p>\r\n\r\n<h3>Deploying and maintaining</h3>\r\nOnce the application has passed the Testing phase, it is ready to be deployed for customer use. There are often multiple stages of deployment (Alpha, Beta, and General Availability are common ones), each with its own breadth of deployment (for example, alpha releases tend to be deployed to select customers, whereas general availability means it’s ready for everyone).\r\n\r\nOnce applications have been tested and successfully deployed, they enter a maintenance phase where they’re continually monitored and updated. During the Maintaining phase, the production software undergoes an ongoing cycle of the SDLC process, where security patches and other updates go through the same planning, defining, designing, developing, testing, and deploying activities discussed in the preceding sections.\r\n\r\nMany SDLC models include a separate phase for disposal or termination, which happens when an application is no longer needed or supported. From a security perspective, you should keep in mind that data (including portions of applications) may remain in cloud environments even after deletion. Consult your contracts and SLAs for commitments that your CSP makes for data deletion.\r\n<h2 id=\"tab3\" >Methodologies</h2>\r\nAlthough the steps within the SDLC remain largely constant, several SDLC methodologies, or models, exist, and each approaches these steps in slightly different ways. Two of the most commonly referenced and used methodologies are waterfall and agile.\r\n<h3>Waterfall</h3>\r\n<em>Waterfall</em> is the oldest and most straightforward SDLC methodology. In this model, you complete one phase and then continue on to the next — you move in sequential order, flowing through every step of the cycle from beginning to end. Each phase of this model relies on successful completion of the previous phase; there’s no going back, because... well, because waterfalls don’t flow up.\r\n\r\nSome advantages of the waterfall methodology include\r\n<ul>\r\n \t<li>It’s simple to manage and easy to follow.</li>\r\n \t<li>Tracking and measuring progress is easy because you have a clearly defined end state early on.</li>\r\n \t<li>The measure twice, cut once approach allows applications to be developed based upon a more complete understanding of all requirements and deliverables from the start.</li>\r\n \t<li>The process can largely occur without customer intervention after requirements are initially gathered. Customers and developers agree on desired outcomes early in the project.</li>\r\n</ul>\r\nSome challenges that come with waterfall include\r\n<ul>\r\n \t<li>It’s rigid. Requirements must be fully developed early in the process and are difficult to change once the design has been completed.</li>\r\n \t<li>Products may take longer to deliver compared to more iterative models, like agile.</li>\r\n \t<li>It relies very little on the customer or end-user, which may make some customers feel left out.</li>\r\n \t<li>Testing is delayed until late in the process, which may allow small issues to build up into larger ones before they’re detected.</li>\r\n</ul>\r\n<h3>Agile</h3>\r\n<em>Agile</em> is more of the new kid on the block, having been introduced in the 1990s. In this model, instead of proceeding in a linear and sequential fashion, development and testing activities occur simultaneously and cyclically.\r\n\r\nApplication development is separated into <em>sprints</em> that produce a succession of releases that each improves upon the previous release. With the agile model, the goal is to move quickly and to fail fast — create your first release, test it, fix it, and create your next release fast!\r\n\r\nSome advantages of the agile methodology include\r\n<ul>\r\n \t<li>It’s flexible. You can move from one phase to the next without worrying that the previous phase isn’t perfect or complete.</li>\r\n \t<li>Time to market is much quicker than waterfall.</li>\r\n \t<li>It’s very user-focused; the customer has frequent opportunities to give feedback on the application.</li>\r\n \t<li>Risks may be reduced because the iterative nature of agile allows you get feedback and conduct testing early and often.</li>\r\n</ul>\r\nSome challenges that come with Agile include\r\n<ul>\r\n \t<li>It can be challenging to apply in real-life projects, especially larger projects with many stakeholders and components.</li>\r\n \t<li>The product end-state is less predictable than waterfall. With agile, you iterate until you’re happy with the result.</li>\r\n \t<li>It requires a very high level of collaboration and frequent communication between developers, customers, and other stakeholders. This challenge can be a pro, but sometimes has a negative impact on developers and project timelines.</li>\r\n</ul>","blurb":"","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"primaryCategoryTaxonomy":{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"}},"secondaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Business requirements","target":"#tab1"},{"label":"SDLC phases","target":"#tab2"},{"label":"Methodologies","target":"#tab3"}],"relatedArticles":{"fromBook":[{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}],"fromCategory":[{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}},{"articleId":274120,"title":"Design Principles of Secure Cloud Computing","slug":"design-principles-of-secure-cloud-computing","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274120"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281662,"slug":"ccsp-for-dummies-with-online-practice","isbn":"9781394212811","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"amazon":{"default":"//www.amazon.com/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421281X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/ccsp-for-dummies-2nd-edition-cover-9781394212811-203x255.jpg","width":203,"height":255},"title":"CCSP For Dummies","testBankPinActivationLink":"//coursofppt.com/go/fdactivatepin","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"33440\">Arthur J. Deane</b></b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.</p>","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65835617a6b76\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65835617a734f\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-12-20T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":274173},{"headers":{"creationTime":"2021-09-16T20:48:32+00:00","modifiedTime":"2024-12-20T20:39:39+00:00","timestamp":"2024-12-20T21:01:11+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"CCSP","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"},"slug":"ccsp","categoryId":34392}],"title":"CCSP For Dummies Cheat Sheet","strippedTitle":"ccsp for dummies cheat sheet","slug":"ccsp-for-dummies-cheat-sheet","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"Preparing to take the CCSP exam? Get some tips on taking the exam and learn a bit about cloud computing and the Shared Responsibility Model.","noIndex":0,"noFollow":0},"content":"The Certified Cloud Security Professional (CCSP) credential is based upon a Common Body of Knowledge (CBK) jointly developed by the International Information Systems Security Certification Consortium (ISC)<sup>2</sup> and the Cloud Security Alliance (CSA).\r\n\r\nThe CBK (and the associated exam) includes six domains that cover separate, but interrelated, areas: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform & Infrastructure Security; Cloud Application Security; <a href=\"//coursofppt.com/programming/certification/assess-mitigate-vulnerabilities-security-architectures-designs-solution-elements/\" target=\"_blank\" rel=\"noopener\">Cloud Security</a> Operations; and Legal, Risk and Compliance. A ton of information is in these domains, and you can use this Cheat Sheet to remember some of the most important parts.","description":"The Certified Cloud Security Professional (CCSP) credential is based upon a Common Body of Knowledge (CBK) jointly developed by the International Information Systems Security Certification Consortium (ISC)<sup>2</sup> and the Cloud Security Alliance (CSA).\r\n\r\nThe CBK (and the associated exam) includes six domains that cover separate, but interrelated, areas: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform & Infrastructure Security; Cloud Application Security; <a href=\"//coursofppt.com/programming/certification/assess-mitigate-vulnerabilities-security-architectures-designs-solution-elements/\" target=\"_blank\" rel=\"noopener\">Cloud Security</a> Operations; and Legal, Risk and Compliance. A ton of information is in these domains, and you can use this Cheat Sheet to remember some of the most important parts.","blurb":"","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"primaryCategoryTaxonomy":{"categoryId":34392,"title":"CCSP","slug":"ccsp","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34392"}},"secondaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}}],"fromCategory":[{"articleId":274173,"title":"The Secure Software Development Lifecycle (SDLC) Process","slug":"the-secure-software-development-lifecycle-sdlc-process","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274173"}},{"articleId":274167,"title":"CCSP Exam and Virtualization","slug":"ccsp-exam-and-virtualization","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274167"}},{"articleId":274162,"title":"10 Tips to Help You Prepare for the CCSP Exam","slug":"10-tips-to-help-you-prepare-for-the-ccsp-exam","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274162"}},{"articleId":274154,"title":"CCSP: Data Security Technologies and Strategies","slug":"ccsp-data-security-technologies-and-strategies","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274154"}},{"articleId":274125,"title":"Cloud Data Storage Architectures","slug":"cloud-data-storage-architectures","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/274125"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281662,"slug":"ccsp-for-dummies-with-online-practice","isbn":"9781394212811","categoryList":["academics-the-arts","study-skills-test-prep","ccsp"],"amazon":{"default":"//www.amazon.com/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421281X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421281X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/ccsp-for-dummies-2nd-edition-cover-9781394212811-203x255.jpg","width":203,"height":255},"title":"CCSP For Dummies","testBankPinActivationLink":"//coursofppt.com/go/fdactivatepin","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"33440\">Arthur J. Deane</b></b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.</p>","authors":[{"authorId":33440,"name":"Arthur J. Deane","slug":"arthur-deane","description":"<b>Arthur J. Deane</b> is a security and compliance executive at Google. He is a technical professional with 13+ years experience in information security, cloud security, IT risk management, and systems engineering.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/33440"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65835617514bf\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;ccsp&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394212811&quot;]}]\" id=\"du-slot-65835617527d3\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/"}}],"content":[{"title":"Helpful tips to prepare for the CCSP exam","thumb":null,"image":null,"content":"<p>Taking any standardized test can be a bit scary — and the CCSP is a definitely no joke! Not to worry, though. With proper preparation (like reading <em>CCSP For Dummies with Online Practice</em>) and following these key tips, you’ll be well on your way to acing the exam!</p>\n<ul>\n<li><strong>Brush up on the prerequisites.</strong> Passing the CCSP exam requires that you know a lot about information security and a lot about cloud computing. To make studying for the CCSP a little less underwhelming, make sure that you already have a strong grasp of general IT topics, like networking and databases. Having Information Security experience is also a great idea, but <em>CCSP For Dummies</em> includes a chapter dedicated to Information Security fundamentals, if you need a primer or refresher.</li>\n<li><strong>Register for exam . . . like now!</strong> It’s so easy to say, “I’ll register when I’m ready for the exam,” but setting a test date and sticking to it is a great way to stay motivated by working toward a specific goal. Worst case scenario: You can always reschedule your exam.</li>\n<li><strong>Identify your learning style.</strong> Some people learn best by reading several books cover to cover, and others like a combination of reading, classroom learning, and study groups. Set yourself up for success by identifying what works best for you and making that happen.</li>\n<li><strong>Make your study plan.</strong> Create an aggressive, yet realistic, study plan that you’ll stick to. Sixty to 90 days (in addition to your lifetime of experiences) is a good target for most people. Stay away from longer than 120-day study plans — longer periods tend to lead to shorter attention spans.</li>\n<li><strong>Practice, practice, practice.</strong> Do plenty practice questions after you read <em>CCSP For Dummies</em> and throughout your studies. Start with the practice questions that come with the book and then scour the interwebs for as many other practice sets as you can find — just make sure they’re legitimate sources!</li>\n</ul>\n"},{"title":"The Shared Responsibility Model","thumb":null,"image":null,"content":"<p>Talk about cloud computing, and the Shared Responsibility Model almost always creeps into the conversation — seriously! The Shared Responsibility is a critical concept that underlies how the cloud and cloud data is secured. When you’re studying for the CCSP, you should really understand this topic like the back of your hand.</p>\n<p>The cloud Shared Responsibility Model identifies the separate, but connected, responsibilities held by the cloud provider and the cloud customer.</p>\n<p>In general, the cloud provider is responsible for security of the cloud, while the cloud customer is responsible for “security in the cloud.” See the following figure.</p>\n<div class=\"figure-container\"><figure id=\"attachment_301272\" aria-labelledby=\"figcaption_attachment_301272\" class=\"wp-caption aligncenter\" style=\"width: 545px\"><img loading=\"lazy\" class=\"wp-image-301272 size-full\" src=\"//coursofppt.com/wp-content/uploads/9781394212811-cs01.jpg\" alt=\"diagram showing the Shared Responsibility Model overview\" width=\"535\" height=\"322\" /><figcaption id=\"figcaption_attachment_301272\" class=\"wp-caption-text\">Shared Responsibility Model overview.</figcaption></figure></div><div class=\"clearfix\"></div>\n<p>In general, the cloud provider is responsible for security of the cloud, while the cloud customer is responsible for “security in the cloud.” See the following figure.</p>\n<p>The responsibilities will be broken up differently based on the cloud service model that you’re using — IaaS, PaaS, or SaaS. See the following figure.&nbsp;</p>\n<div class=\"figure-container\"><figure id=\"attachment_301273\" aria-labelledby=\"figcaption_attachment_301273\" class=\"wp-caption aligncenter\" style=\"width: 545px\"><img loading=\"lazy\" class=\"wp-image-301273 size-full\" src=\"//coursofppt.com/wp-content/uploads/9781394212811-cs02.jpg\" alt=\"diagram showing the responsibilities by service model\" width=\"535\" height=\"393\" /><figcaption id=\"figcaption_attachment_301273\" class=\"wp-caption-text\">Responsibilities by service model.</figcaption></figure></div><div class=\"clearfix\"></div>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2023-02-18T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":273450},{"headers":{"creationTime":"2017-03-27T16:57:28+00:00","modifiedTime":"2024-11-01T19:37:58+00:00","timestamp":"2024-11-01T21:01:13+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"Armed Services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"},"slug":"armed-services","categoryId":33776}],"title":"ASVAB AFQT For Dummies Cheat Sheet","strippedTitle":"asvab afqt for dummies cheat sheet","slug":"asvab-afqt-for-dummies-cheat-sheet","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"Learn about the AFQT score, eligibility scores for different military branches, and how to do well on the math subtests.","noIndex":0,"noFollow":0},"content":"If you're thinking about joining the U.S. military, your Armed Forces Qualification Test (AFQT) score may well be the most important score you achieve on any military test. You need a qualifying score on the AFQT, or your plans for enlistment come to a dead end — and each branch of the military has its own minimum AFQT score requirements.\r\n\r\nPart of getting a high score on the AFQT involves brushing up on your math skills. You need to memorize key formulas and use proven test-taking strategies to maximize your chances for a high math score. The other part is making sure you have a firm grasp on English; in order to ace the language parts of the AFQT, you need a solid vocabulary and good reading comprehension skills.","description":"If you're thinking about joining the U.S. military, your Armed Forces Qualification Test (AFQT) score may well be the most important score you achieve on any military test. You need a qualifying score on the AFQT, or your plans for enlistment come to a dead end — and each branch of the military has its own minimum AFQT score requirements.\r\n\r\nPart of getting a high score on the AFQT involves brushing up on your math skills. You need to memorize key formulas and use proven test-taking strategies to maximize your chances for a high math score. The other part is making sure you have a firm grasp on English; in order to ace the language parts of the AFQT, you need a solid vocabulary and good reading comprehension skills.","blurb":"","authors":[{"authorId":11018,"name":"Angie Papple Johnston","slug":"angie-papple-johnston","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11018"}}],"primaryCategoryTaxonomy":{"categoryId":33776,"title":"Armed Services","slug":"armed-services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":248835,"title":"How To Save Time on the ASVAB AFQT Math Exam","slug":"use-commutative-associative-properties-speed-asvab-afqt","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248835"}},{"articleId":248832,"title":"Solving Real-World Math Problems on the ASVAB AFQT","slug":"solving-real-world-problems-asvab-afqt","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248832"}},{"articleId":248829,"title":"Solving Percent Problems on the ASVAB AFQT","slug":"solving-percent-problems-asvab-afqt","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248829"}},{"articleId":248826,"title":"ASVAB AFQT Practice: Identifying Formulas","slug":"asvab-afqt-practice-identifying-formulas","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248826"}},{"articleId":248823,"title":"Solving Equations and Inequalities on the ASVAB AFQT","slug":"solving-equations-inequalities-asvab-afqt","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248823"}}],"fromCategory":[{"articleId":295645,"title":"What Is the ASVAB Test?","slug":"what-is-the-asvab-test","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/295645"}},{"articleId":283798,"title":"Mastering the Science of Movement Training for the ACFT","slug":"mastering-the-science-of-movement-training-for-the-acft","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283798"}},{"articleId":283793,"title":"ACFT Event: Two-Mile Run","slug":"acft-event-two-mile-run","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283793"}},{"articleId":283786,"title":"ACFT Event: Leg Tuck","slug":"acft-event-leg-tuck","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283786"}},{"articleId":283778,"title":"ACFT Event: Sprint-Drag-Carry","slug":"acft-event-sprint-drag-carry","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283778"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281964,"slug":"asvab-afqt-for-dummies-book-8-practice-tests-online-3rd-edition","isbn":"9781394216369","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"amazon":{"default":"//www.amazon.com/gp/product/139421636X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/139421636X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/139421636X-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/139421636X/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/139421636X/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/asvab-afqt-for-dummies-4th-edition-cover-9781394216369-199x255.jpg","width":199,"height":255},"title":"ASVAB AFQT For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b><b data-author-id=\"11018\">Angie Papple Johnston</b></b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b><b data-author-id=\"9112\">Rod Powers</b></b> served more than 20 years in the U.S. Air Force and retired as a first sergeant.</p>","authors":[{"authorId":11018,"name":"Angie Papple Johnston","slug":"angie-papple-johnston","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11018"}},{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394216369&quot;]}]\" id=\"du-slot-6542bc99cd1b3\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394216369&quot;]}]\" id=\"du-slot-6542bc99cd8c1\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":194271,"title":"ASVAB AFQT Qualifying Scores","slug":"asvab-afqt-qualifying-scores","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/194271"}},{"articleId":194270,"title":"Acing the Math Subtests of the ASVAB AFQT","slug":"acing-the-math-subtests-of-the-asvab-afqt","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/194270"}}],"content":[{"title":"ASVAB AFQT qualifying scores","thumb":null,"image":null,"content":"<p>To enlist in the U.S. military, you have to take the Armed Services Vocational Aptitude Battery (ASVAB) exam, which consists of nine separately timed subtests. These subtests are used by the military to determine your aptitude to learn various military jobs.</p>\n<p>Four of the ASVAB subtests are used to compute the Armed Forces AFQT score, a percentile score that runs from 1 to 99. This score determines whether you’re qualified to join the military service of your choice. Each branch of the military has its own minimum AFQT score standards:</p>\n<ul>\n<li><strong>Army (including Army National Guard and Army Reserves):</strong> The Army requires a minimum AFQT score of 31 for those with a high school diploma and a score of 50 for those with a high school equivalency certificate. When the Army is experiencing high recruiting and reenlistment rates, it has been known to temporarily increase its qualifying AFQT score minimum to as high as 50.</li>\n<li><strong>Air Force (including Air National Guard and Air Force Reserves):</strong> Air Force recruits must score at least a 36 on the AFQT to qualify for enlistment, but more than 70 percent of people who are accepted for an Air Force enlistment score 50 or above. For those who have a high school equivalency certificate instead of a high school diploma, the minimum score is 65.</li>\n<li><strong>Navy:</strong> Navy recruits must score at least 35 on the AFQT to qualify for enlistment. If you have a high school equivalency certificate, the minimum score is 50.</li>\n<li><strong>Navy Reserves:</strong> The Navy Reserves requires a minimum score of 31 on the AFQT for those with a high school diploma and 50 for those with a high school equivalency certificate. The Navy is the only branch for which the requirements for the Reserves are different from the requirements for the branch itself.</li>\n<li><strong>Marine Corps (including Marine Corps Reserves):</strong> Marine Corps recruits must score at least 32. People who have a high school equivalency certificate must score a minimum of 50 on the AFQT to be considered. The Marine Corps limits GED enlistments to about 5 percent to 10 percent per year.</li>\n<li><strong>Coast Guard (including Coast Guard Reserves):</strong> The Coast Guard requires a minimum of 40 points on the AFQT. A waiver is possible for applicants with prior service if their ASVAB line scores qualify them for a specific job and they’re willing to enlist in that job. The minimum AFQT score for people who have a high school equivalency certificate is 50.</li>\n</ul>\n"},{"title":"Acing the math subtests","thumb":null,"image":null,"content":"<p>Two of the four subtests that make up your AFQT score are math tests. The first, Arithmetic Reasoning, tests your ability to use mathematics to solve various problems that you may encounter in real life — in other words, math word problems.</p>\n<p>The second, Mathematics Knowledge, tests your ability to solve general math problems. Here are some tips to help maximize your ASVAB math subtest scores:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><strong>Memorize the math order of operations.</strong> Start by working everything in parentheses. Then move on to exponents. Then perform any multiplication and division. End with addition and subtraction. An easy way to remember this order is to think of the phrase, “<strong>P</strong>lease <strong>E</strong>xcuse <strong>M</strong>y <strong>D</strong>ear <strong>A</strong>unt <strong>S</strong>ally” (<strong>P</strong>arentheses, <strong>E</strong>xponents, <strong>M</strong>ultiply, <strong>D</strong>ivide, <strong>A</strong>dd, <strong>S</strong>ubtract). While this order is flexible in some situations, knowing the basic order will help you maximize your score.</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Remember the apples-and-oranges rule. </strong>Be sure to convert units of measurement so that they’re consistent. If a question asks how many 3-x-6-inch bricks it will take to cover a 6-x-6-foot patio, be sure to recognize that inches and feet are two different measurements and perform the necessary conversions.</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Memorize common math formulas before the day of the test. </strong>These formulas are not provided for you at the testing center. After you receive your scratch paper, take a moment before the test starts and write down all the formulas you’ve memorized. Here’s a list of some of the formulas you need to know:</p>\n<ul class=\"level-two\">\n<li>\n<p class=\"first-para\"><strong>Perimeter of a square:</strong> <em>p</em> = 4<em>s</em>, where <em>s</em> = one side of the square</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Area of a square:</strong> <em>a</em> = <em>s</em><sup>2</sup></p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Diagonal of a square:</strong></p>\n<p><img loading=\"lazy\" src=\"//coursofppt.com/wp-content/uploads/167363.image0.png\" alt=\"image0.png\" width=\"100\" height=\"34\" /></li>\n<li>\n<p class=\"first-para\"><strong>Perimeter of a rectangle:</strong> <em>p</em> = 2<em>l</em> + 2<em>w</em>, where <em>l</em> = the length and <em>w</em> = the width of the rectangle</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Area of a rectangle:</strong> <em>a</em> = <em>lw</em></p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Diagonal of a rectangle:</strong></p>\n<p><img loading=\"lazy\" src=\"//coursofppt.com/wp-content/uploads/167364.image1.png\" alt=\"image1.png\" width=\"110\" height=\"29\" />, where <em>d =</em> the diagonal, <em>l =</em> the length, and <em>w =</em> the width of the rectangle. This formula is the Pythagorean theorem solved for the hypotenuse (c) — it just uses different letters.</li>\n<li>\n<p class=\"first-para\"><strong>Perimeter of a triangle:</strong> <em>p</em> = <em>s</em><sub>1</sub> + <em>s</em><sub>2</sub> + <em>s</em><sub>3</sub>, where <em>s</em> = the length of each leg of the triangle</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Area of a triangle</strong><strong>:</strong></p>\n<p><img loading=\"lazy\" src=\"//coursofppt.com/wp-content/uploads/167365.image2.png\" alt=\"image2.png\" width=\"100\" height=\"59\" />, where <em>b</em> = the length of the triangle’s base (bottom) and <em>h</em> = the height of the triangle</li>\n<li>\n<p class=\"first-para\"><strong>Pythagorean theorem:</strong> <em>a</em><sup>2</sup> + <em>b</em><sup>2</sup> = <em>c</em><sup>2</sup>, where <em>c</em> equals the length of a right triangle’s hypotenuse, and <em>a</em> and <em>b</em> equal the lengths of the remaining two legs of the right triangle</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Radius of a circle</strong><strong>:</strong></p>\n<p><img loading=\"lazy\" src=\"//coursofppt.com/wp-content/uploads/167366.image3.png\" alt=\"image3.png\" width=\"100\" height=\"66\" />, <strong> </strong>where <em>d</em> = the diameter of the circle</li>\n<li>\n<p class=\"first-para\"><strong>Diameter of a circle:</strong> <em>d</em> = 2<em>r</em></p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Circumference of a circle: </strong><em>c</em> = 2Π<em>r</em></p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Area of a circle:</strong> <em>a</em> = Π<em>r</em><sup>2</sup></p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Volume of a cube:</strong> <em>v</em> = <em>s</em><sup>3</sup>, where <em>s</em> = the length of one side of the cube</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Volume of a rectangular box:</strong> <em>v</em> = <em>lwh</em>, where <em>l</em> = the length, <em>w</em> = the width, and <em>h</em> = the height of the box</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Volume of a cylinder:</strong> <em>v</em> = Π<em>r</em><sup>2</sup><em>h</em>, where <em>r</em> = the radius of the cylinder and <em>h</em> = the height of the cylinder</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Surface area of a cube:</strong> <em>SA</em> = 6<em>s</em><sup>2</sup></p>\n</li>\n<li>\n<p class=\"first-para\"><strong>Surface area of a rectangular box:</strong> <em>SA</em> =2<em>lw</em> + 2<em>wh</em> + 2<em>lh</em></p>\n</li>\n</ul>\n</li>\n<li>\n<p class=\"first-para\"><strong>Use the scratch paper provided to help you solve problems.</strong> Draw a picture for math word problems to help you visualize the situation and pick out the relevant information. <strong><em>Remember:</em></strong> You can’t use a calculator on any of the AFQT subtests.</p>\n</li>\n<li>\n<p class=\"first-para\"><strong>For difficult problems, try plugging the possible answer choices into the equation to see which one is right.</strong></p>\n</li>\n<li>\n<p class=\"BulletItem\"><b>Find out how to separate information and pay attention only to what you need to solve the problem.</b> Math word problems often provide extra information to confuse you.</p>\n</li>\n</ul>\n"},{"title":"ASVAB test-taking strategies","thumb":null,"image":null,"content":"<p>You have a 1-in-4 chance of getting the right answer on any given ASVAB question — but you can improve your odds (and your score) if you keep the following test-taking strategies in mind.</p>\n<p><strong>Assess each question quickly.</strong> The ASVAB is timed, so you can only spend a short while on each question. Assessing each question quickly to decide whether you know the answer (or you can figure it out) or whether you need to guess will help ensure that you make it through each subtest with time to spare. If a question is beyond your skill level, make an informed guess and move on.</p>\n<p><strong>Eliminate bad choices.</strong> If you don’t know the answer to a question but you’re sure one or two of them are wrong, focus on the remaining answers and try to determine which one is more reasonable. Ruling out obviously incorrect answers will help improve your odds of getting the right answer.</p>\n<p><strong>Answer every question.</strong> Most people take the computerized version of the ASVAB (CAT-ASVAB), but a small number of people still take the paper and pencil (P&amp;P) version of the test. Either way, strive to answer every question. You have a 100 percent chance of getting a question wrong if you don’t answer it, but at least a 25 percent chance of getting it right.</p>\n<p><strong>Pay special attention the questions that follow guesses.</strong> The CAT-ASVAB adapts to your skill level. That means it first presents you with a question of medium difficulty; if you get it right, you see a harder question next. Get it wrong and the computer dishes up an easier one. A series of wrong answers can be really bad for your score, so if you’re taking the CAT-ASVAB and need to guess on a question, pay extra attention to the one that follows it. Getting that question right will help the test evaluate your ability more accurately.</p>\n<p class=\"article-tips tip\">The CAT-ASVAB adapts to your ability. Some people take the entire test without ever seeing a difficult question, while others find that most of their questions feature advanced concepts. Your mileage <em>will </em>vary based on your skills.</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-11-01T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":209273},{"headers":{"creationTime":"2017-03-27T16:50:21+00:00","modifiedTime":"2024-10-31T17:42:27+00:00","timestamp":"2024-10-31T18:01:09+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"GMAT","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33784"},"slug":"gmat","categoryId":33784}],"title":"GMAT Prep For Dummies Cheat Sheet","strippedTitle":"gmat prep for dummies cheat sheet","slug":"gmat-for-dummies-cheat-sheet","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"Here are guidelines, tips, and tricks for answering the different parts of the GMAT, including math, integrated reasoning, and reading comprehension.","noIndex":0,"noFollow":0},"content":"When you take the Graduate Management Admission Test (GMAT), make sure you take the required items with you to the test. Use these guidelines to help you get through the integrated reasoning, data sufficiency, quantitative problem solving, reading comprehension, and critical reasoning questions — as well as for writing your analytical essay and conquering integrated reasoning questions.\r\n\r\n[caption id=\"attachment_283522\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-283522\" src=\"//coursofppt.com/wp-content/uploads/GMAT-graphic.jpg\" alt=\"GMAT\" width=\"556\" height=\"556\" /> © Waldemarus / Shutterstock.com[/caption]","description":"When you take the Graduate Management Admission Test (GMAT), make sure you take the required items with you to the test. Use these guidelines to help you get through the integrated reasoning, data sufficiency, quantitative problem solving, reading comprehension, and critical reasoning questions — as well as for writing your analytical essay and conquering integrated reasoning questions.\r\n\r\n[caption id=\"attachment_283522\" align=\"alignnone\" width=\"556\"]<img class=\"size-full wp-image-283522\" src=\"//coursofppt.com/wp-content/uploads/GMAT-graphic.jpg\" alt=\"GMAT\" width=\"556\" height=\"556\" /> © Waldemarus / Shutterstock.com[/caption]","blurb":"","authors":[{"authorId":9086,"name":"Lisa Zimmer Hatch","slug":"lisa-zimmer-hatch","description":" <p><b>Lisa Zimmer Hatch </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b>Scott A. Hatch</b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9086"}},{"authorId":9087,"name":"Scott A. Hatch","slug":"scott-a-hatch","description":" <p><b>Lisa Zimmer Hatch </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b>Scott A. Hatch</b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9087"}},{"authorId":11243,"name":"Sandra Luna McCune","slug":"sandra-luna-mccune","description":" <p><b>Lisa Zimmer Hatch </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b>Scott A. Hatch</b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11243"}}],"primaryCategoryTaxonomy":{"categoryId":33784,"title":"GMAT","slug":"gmat","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33784"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":283513,"title":"The Coordinate Plane and the GMAT","slug":"the-coordinate-plane-and-the-gmat","categoryList":["academics-the-arts","study-skills-test-prep","gmat"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283513"}},{"articleId":283506,"title":"Multi-Source Reasoning Questions on the GMAT","slug":"multi-source-reasoning-questions-on-the-gmat","categoryList":["academics-the-arts","study-skills-test-prep","gmat"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283506"}},{"articleId":283501,"title":"Table Analysis Questions on the GMAT","slug":"table-analysis-questions-on-the-gmat","categoryList":["academics-the-arts","study-skills-test-prep","gmat"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283501"}},{"articleId":283496,"title":"Preparing for Integrated Reasoning on the GMAT","slug":"what-the-gmats-integrated-reasoning-section-is-all-about","categoryList":["academics-the-arts","study-skills-test-prep","gmat"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283496"}},{"articleId":249437,"title":"GMAT Practice Questions: Sentence Completion","slug":"gmat-verbal-section-practice-sentence-completion","categoryList":["academics-the-arts","study-skills-test-prep","gmat"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/249437"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":300432,"slug":"gmat-prep-2024-2025-for-dummies","isbn":"9781394183364","categoryList":["academics-the-arts","study-skills-test-prep","gmat"],"amazon":{"default":"//www.amazon.com/gp/product/1394183364/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394183364/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394183364-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394183364/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394183364/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/gmat-prep-2024-2025-for-dummies-cover-9781394183364-197x255.jpg","width":197,"height":255},"title":"GMAT Prep 2024/2025 For Dummies with Online Practice (GMAT Focus Edition)","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b>Lisa Zimmer Hatch </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b><b data-author-id=\"9087\">Scott A. Hatch</b></b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions. <p><b><b data-author-id=\"9086\">Lisa Zimmer Hatch</b> </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b>Scott A. Hatch</b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions. <p><b>Lisa Zimmer Hatch </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b>Scott A. Hatch</b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions.</p>","authors":[{"authorId":9087,"name":"Scott A. Hatch","slug":"scott-a-hatch","description":" <p><b>Lisa Zimmer Hatch </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b>Scott A. Hatch</b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9087"}},{"authorId":9086,"name":"Lisa Zimmer Hatch","slug":"lisa-zimmer-hatch","description":" <p><b>Lisa Zimmer Hatch </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b>Scott A. Hatch</b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9086"}},{"authorId":11243,"name":"Sandra Luna McCune","slug":"sandra-luna-mccune","description":" <p><b>Lisa Zimmer Hatch </b>served as VP of The Center for Legal Studies, where she created standardized test preparation. Currently, she is an Independent College Counselor and president of College Primers.</p> <p><b>Scott A. Hatch</b> develops courses for a variety of careers and assists those seeking advanced degrees in law, business, and other professions. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11243"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[{"title":"Career Shifting","slug":"career-shifting","collectionId":295890}],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;gmat&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394183364&quot;]}]\" id=\"du-slot-654140e59e683\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;gmat&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394183364&quot;]}]\" id=\"du-slot-654140e59edfd\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":170923,"title":"Items You Should Take to the GMAT","slug":"items-you-should-take-to-the-gmat","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/170923"}},{"articleId":170907,"title":"GMAT Math Question Tricks and Tips","slug":"gmat-math-question-tricks-and-tips","categoryList":["academics-the-arts","study-skills-test-prep","gmat"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/170907"}},{"articleId":170929,"title":"Tips and Tricks for GMAT Critical Reasoning Questions","slug":"tips-and-tricks-for-gmat-critical-reasoning-questions","categoryList":["academics-the-arts","study-skills-test-prep","gmat"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/170929"}},{"articleId":170911,"title":"Helpful Hints for GMAT Sentence Correction Questions","slug":"helpful-hints-for-gmat-sentence-correction-questions","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/170911"}},{"articleId":170931,"title":"Tips for the GMAT Reading Comprehension Questions","slug":"tips-for-the-gmat-reading-comprehension-questions","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/170931"}},{"articleId":170910,"title":"Tricks for the GMAT Analytical Writing Assessment","slug":"tricks-for-the-gmat-analytical-writing-assessment","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/170910"}},{"articleId":170921,"title":"Guidelines for Answering GMAT Integrated Reasoning Questions","slug":"guidelines-for-answering-gmat-integrated-reasoning-questions","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/170921"}}],"content":[{"title":"Items you should take to the GMAT","thumb":null,"image":null,"content":"<p>Forget your calculator when you take the GMAT. The only things you need to bring with you to the test, besides a confident attitude and a good night&#8217;s sleep, are:</p>\n<ul class=\"level-one\">\n<li>\n<p class=\"first-para\"><b>Your appointment confirmation letter or email:</b> When you schedule an appointment for the GMAT, Pearson VUE sends you a confirmation letter or e-mail that you should bring with you to the test. It proves you&#8217;re registered. Don&#8217;t despair if you can&#8217;t find yours, though. They&#8217;ll let you in if you have an appointment.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>A photo ID:</b> You have to prove that you&#8217;re you and not your really smart neighbor who looks a little like you coming in to take the test for you. Any form of identification that doesn&#8217;t have your picture on it is unacceptable, but valid government-issued picture IDs, like driver&#8217;s licenses, passports, identification cards, and military IDs, are great as long as they&#8217;re originals (no photocopies) and they present your name and date of birth <i>exactly</i> as you stated them when you registered for the GMAT.</p>\n</li>\n<li>\n<p class=\"first-para\"><b>The names of up to five of your favorite MBA programs:</b> Pearson VUE sends your GMAT scores to five programs of your choice, so if you didn&#8217;t enter them online when you registered, be sure to have a list of your five favorites with you on test day.</p>\n</li>\n</ul>\n"},{"title":"GMAT integrated reasoning tips and tricks","thumb":null,"image":null,"content":"<p>The GMAT integrated reasoning questions test how well you apply logical reasoning to real-life situations. Here are some tips to guide you through this unusual section of questions:</p>\n<ul>\n<li>Sift through information to determine what is relevant.</li>\n<li>Carefully read questions and graphical or visual representations of information.</li>\n<li>Be prepared to draw inferences and make judgment, recognize cause and effect, identify relationships in information, and apply rules or principles from provided information.</li>\n<li>Expect to perform simple computations, such as percent change or averages.</li>\n<li>Ignore excess data that you don’t need.</li>\n<li>Answer questions based on the information given, not on your personal knowledge.</li>\n<li>Use the noteboard to keep track of information.</li>\n<li>Use the onscreen calculator only when necessary.</li>\n<li>Pace yourself so that you can answer all the questions and subparts in the given timeframe.</li>\n</ul>\n"},{"title":"Guidelines for answering the data sufficiency questions","thumb":null,"image":null,"content":"<p>Data sufficiency questions require that you analyze the data in two statements and determine whether at some point there is <em>sufficient</em> information for you to answer the question. Here are some guidelines for approaching this question type, which is unique to the data insights section of the GMAT:</p>\n<ul>\n<li>Memorize the five fixed answer choices so you don’t have to refer to them.</li>\n<li>Read carefully to know exactly what the question posed is asking.</li>\n<li>Avoid making unwarranted assumptions, such as assuming the variable <em>x</em> is always positive.</li>\n<li>Be sure to check whether the second statement is sufficient when the first statement is determined to be sufficient.</li>\n<li>When the question posed asks for the value of a quantity, decide given information is sufficient only if exactly <u>one</u> numerical value for the quantity can be determined.</li>\n<li>When the question posed is a yes or no question, decide given information is sufficient only if a <u>definite</u> yes or no answer is possible.</li>\n<li>Don’t work out solutions to the question posed unless you can’t decide sufficiency without doing so.</li>\n<li>Use the onscreen calculator as needed.</li>\n<li>If a question is taking too much time, make a strategic guess and move on.</li>\n</ul>\n"},{"title":"Math questions tips and tricks","thumb":null,"image":null,"content":"<p>Does the thought of taking the GMAT math test make you break out in a cold sweat? Relax, and use these tips and tricks to help you tackle the quantitative section of the GMAT:</p>\n<ul>\n<li>Be prepared to use your knowledge of basic math, probability and statistics, algebra, and problem solving.</li>\n<li>Memorize formulas and other common math knowledge beforehand.</li>\n<li>Write expressions and sketch diagrams on the erasable noteboard correctly.</li>\n<li>Avoid making arithmetic or algebra mistakes.</li>\n<li>Check to make sure you didn’t overlook something when formulating an equation.</li>\n<li>Read all the answer choices before you select an answer.</li>\n<li>Eliminate answer choices that don’t make sense.</li>\n<li>If a question is taking too much time, make a strategic guess and move on.</li>\n</ul>\n"},{"title":"Tips for the reading comprehension questions","thumb":null,"image":null,"content":"<p>GMAT reading questions are designed to test how well you extract information from a passage. So follow these suggestions when answering the reading comprehension questions in the verbal section of the GMAT:</p>\n<ul>\n<li>Read the entire passage. Don’t skim.</li>\n<li>Read the question prompt and ask yourself what type of question it is: is it asking for the main idea, for a fact from the passage, for the best answer based on your inferring, about the style and tone, or is it another type?</li>\n<li>Eliminate answer choices you know cannot be correct. Then return to the passage and look for your answer.</li>\n<li>In questions about the author’s tone, remember that the reading comprehension passages are usually written in fairly neutral style.</li>\n<li>In vocabulary questions, avoid guessing on a big word you don’t know just because it sounds impressive.</li>\n<li>When answering an inference question, look for logical hops in thinking, not giant, unsubstantiated leaps.</li>\n</ul>\n"},{"title":"Tips and tricks for the critical reasoning questions","thumb":null,"image":null,"content":"<p>The critical reasoning questions on the GMAT are all about using logic. To maximize your potential on the critical reasoning questions in the verbal section of the GMAT, use these helpful techniques:</p>\n<ul>\n<li>There are several different types of critical reasoning questions, so it’s a good idea to read the question first before the passage. That will help you establish what the question is looking for: to support the argument, to weaken it, to conclude it, etc.</li>\n<li>Some passages have multiple questions. Always consider them separately.</li>\n<li>Do not bring your own knowledge to the question. Use only the passage provided.</li>\n<li>Remember that the argument presented is likely to be weak or flawed.</li>\n<li>Most critical reasoning questions will ask you to strengthen or weaken the author’s logic. It’s therefore important to be able to explain what the logic – not just the topic – is. If you can find the spine of the logic, you’ll be in better shape to weaken or support it.</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-09-05T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":208102},{"headers":{"creationTime":"2017-03-26T14:38:08+00:00","modifiedTime":"2024-10-18T20:58:02+00:00","timestamp":"2024-10-18T21:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"Armed Services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"},"slug":"armed-services","categoryId":33776}],"title":"4 Ways to Fine-Tune Specific ASVAB Study Areas","strippedTitle":"4 ways to fine-tune specific asvab study areas","slug":"4-ways-to-fine-tune-specific-asvab-study-areas","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"As you're studying for the ASVAB, try these four different ways to strengthen your knowledge and skills in areas where you need more work.","noIndex":0,"noFollow":0},"content":"After you’ve identified which ASVAB subjects you’re the weakest in, concentrate on boosting your abilities in those areas to improve your overall success on the exam. These tips can point you in the right direction as you study:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Check out library books about the specific subject you’re struggling with, such as human anatomy or beginner’s electronics.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Review reliable online sources related to ASVAB subjects.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Ask someone in your community to tutor you. For example, get your Uncle Joe to show you the parts under the hood of his prized Camaro.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Study with a buddy. Saying things out loud can help with memorization. Not to mention, studying with someone else makes you more accountable and can even make learning fun.</p>\r\n</li>\r\n</ul>","description":"After you’ve identified which ASVAB subjects you’re the weakest in, concentrate on boosting your abilities in those areas to improve your overall success on the exam. These tips can point you in the right direction as you study:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Check out library books about the specific subject you’re struggling with, such as human anatomy or beginner’s electronics.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Review reliable online sources related to ASVAB subjects.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Ask someone in your community to tutor you. For example, get your Uncle Joe to show you the parts under the hood of his prized Camaro.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Study with a buddy. Saying things out loud can help with memorization. Not to mention, studying with someone else makes you more accountable and can even make learning fun.</p>\r\n</li>\r\n</ul>","blurb":"","authors":[{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}}],"primaryCategoryTaxonomy":{"categoryId":33776,"title":"Armed Services","slug":"armed-services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":207899,"title":"ASVAB: 1001 Practice Questions For Dummies Cheat Sheet","slug":"1001-asvab-practice-questions-for-dummies-cheat-sheet","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/207899"}},{"articleId":164183,"title":"Following an ASVAB Study Schedule","slug":"following-an-asvab-study-schedule","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/164183"}},{"articleId":164184,"title":"10 Ways to Memorize Information for the ASVAB","slug":"10-ways-to-memorize-information-for-the-asvab","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/164184"}}],"fromCategory":[{"articleId":295645,"title":"What Is the ASVAB Test?","slug":"what-is-the-asvab-test","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/295645"}},{"articleId":283798,"title":"Mastering the Science of Movement Training for the ACFT","slug":"mastering-the-science-of-movement-training-for-the-acft","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283798"}},{"articleId":283793,"title":"ACFT Event: Two-Mile Run","slug":"acft-event-two-mile-run","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283793"}},{"articleId":283786,"title":"ACFT Event: Leg Tuck","slug":"acft-event-leg-tuck","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283786"}},{"articleId":283778,"title":"ACFT Event: Sprint-Drag-Carry","slug":"acft-event-sprint-drag-carry","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283778"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281914,"slug":"1001-asvab-practice-questions-for-dummies-free-online-practice","isbn":"9781394174249","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"amazon":{"default":"//www.amazon.com/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394174241-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/asvab-1001-practice-questions-for-dummies-2nd-edition-cover-1394174241-203x255.jpg","width":203,"height":255},"title":"ASVAB: 1001 Practice Questions For Dummies (+ Online Practice)","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b><b data-author-id=\"9112\">Rod Powers</b></b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. <p><b><b data-author-id=\"11018\">Angie Papple Johnston</b></b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant.</p>","authors":[{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}},{"authorId":11018,"name":"Angie Papple Johnston","slug":"angie-papple-johnston","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11018"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394174249&quot;]}]\" id=\"du-slot-6530478f37cff\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394174249&quot;]}]\" id=\"du-slot-6530478f382ad\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Five years","lifeExpectancySetFrom":"2024-10-18T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":164180},{"headers":{"creationTime":"2017-03-26T14:38:09+00:00","modifiedTime":"2024-10-18T20:44:00+00:00","timestamp":"2024-10-18T21:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"Armed Services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"},"slug":"armed-services","categoryId":33776}],"title":"10 Ways to Memorize Information for the ASVAB","strippedTitle":"10 ways to memorize information for the asvab","slug":"10-ways-to-memorize-information-for-the-asvab","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"Studying for the ASVAB? Try acronyms, categorizing, chunking, or one of these other memorizing methods to help you prepare for exam day.","noIndex":0,"noFollow":0},"content":"Many subtests in the ASVAB, such as General Science, Mechanical Comprehension, Electronics Information, and Auto and Shop Information, are hard to ace because you probably didn’t learn much about them in high school. So you may need to memorize facts and illustrations to do well in the areas of the ASVAB that you aren’t familiar with.\r\n\r\nUse these ten study methods to trick your brain into remembering all the things you need to know to get an excellent score on the ASVAB:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\"><b>Acronyms:</b> An <i>acronym</i> uses the initial or important letters of a phrase to create an easily memorable abbreviation, such as PEMDAS to help remember the order of operations in mathematics (<b>p</b>arenthesis, <b>e</b>xponents, <b>m</b>ultiplication, <b>d</b>ivision, <b>a</b>ddition, and <b>s</b>ubtraction).</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Acrostics:</b> This mnemonic device uses a group of words that start with particular letters to convey a meaning, such as the newly revised acrostic “My Very Educated Mother Just Showed Us Nothing,” to help you remember the eight planets (sans Pluto): Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, and Neptune.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Categorizing:</b> Mentally dividing information into categories can help you remember similarities and differences. For example, studying plants and animals separately may help you remember photosynthesis, which occurs in plants, not animals.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Chunking:</b> Especially helpful with numbers, <i>chunking</i> is the process of breaking big chunks of information into smaller segments. For example, you can break larger numbers into shorter segments to help you remember them. That’s why you memorize phone numbers by saying “five, five, five, (pause) one, two, three, four.”</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Loci method:</b> This mnemonic device helps you remember something if you can associate that thing with a familiar place (<i>loci</i> means “location”). For example, if you visualize E = MC<sup>2</sup> spray-painted on your bedroom wall, you’re sure to see that picture when you close your eyes, which helps you memorize that formula.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Q and A:</b> Question-and-answer practice is a good study tool for memory if you have more than one person available to quiz you. Get the most out of this study technique by using it together with the re-review method later in this list.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Recording:</b> Recording yourself reviewing information (such as vocabulary definitions) and then playing it back aids in memory retention.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Re-review:</b> Reviewing new information more than once in the same day helps set that information in your brain more effectively than waiting a few days to look over it.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Rhymes:</b> Rhyming with catchy phrases and sentences is an easy way to retain information. For example, “<i>i</i> before <i>e</i> except after <i>c</i>” is a popular rhyme used to help spell some words in the English language.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Visualizing:</b> Creating mental pictures of different concepts you want to memorize makes remembering them easier. For instance, picturing yourself running a marathon, exhausted and out of breath, may help you remember that the <i>exhaust</i> of a car is the tailpipe that blows out the smoke.</p>\r\n</li>\r\n</ul>","description":"Many subtests in the ASVAB, such as General Science, Mechanical Comprehension, Electronics Information, and Auto and Shop Information, are hard to ace because you probably didn’t learn much about them in high school. So you may need to memorize facts and illustrations to do well in the areas of the ASVAB that you aren’t familiar with.\r\n\r\nUse these ten study methods to trick your brain into remembering all the things you need to know to get an excellent score on the ASVAB:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\"><b>Acronyms:</b> An <i>acronym</i> uses the initial or important letters of a phrase to create an easily memorable abbreviation, such as PEMDAS to help remember the order of operations in mathematics (<b>p</b>arenthesis, <b>e</b>xponents, <b>m</b>ultiplication, <b>d</b>ivision, <b>a</b>ddition, and <b>s</b>ubtraction).</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Acrostics:</b> This mnemonic device uses a group of words that start with particular letters to convey a meaning, such as the newly revised acrostic “My Very Educated Mother Just Showed Us Nothing,” to help you remember the eight planets (sans Pluto): Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, and Neptune.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Categorizing:</b> Mentally dividing information into categories can help you remember similarities and differences. For example, studying plants and animals separately may help you remember photosynthesis, which occurs in plants, not animals.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Chunking:</b> Especially helpful with numbers, <i>chunking</i> is the process of breaking big chunks of information into smaller segments. For example, you can break larger numbers into shorter segments to help you remember them. That’s why you memorize phone numbers by saying “five, five, five, (pause) one, two, three, four.”</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Loci method:</b> This mnemonic device helps you remember something if you can associate that thing with a familiar place (<i>loci</i> means “location”). For example, if you visualize E = MC<sup>2</sup> spray-painted on your bedroom wall, you’re sure to see that picture when you close your eyes, which helps you memorize that formula.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Q and A:</b> Question-and-answer practice is a good study tool for memory if you have more than one person available to quiz you. Get the most out of this study technique by using it together with the re-review method later in this list.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Recording:</b> Recording yourself reviewing information (such as vocabulary definitions) and then playing it back aids in memory retention.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Re-review:</b> Reviewing new information more than once in the same day helps set that information in your brain more effectively than waiting a few days to look over it.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Rhymes:</b> Rhyming with catchy phrases and sentences is an easy way to retain information. For example, “<i>i</i> before <i>e</i> except after <i>c</i>” is a popular rhyme used to help spell some words in the English language.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\"><b>Visualizing:</b> Creating mental pictures of different concepts you want to memorize makes remembering them easier. For instance, picturing yourself running a marathon, exhausted and out of breath, may help you remember that the <i>exhaust</i> of a car is the tailpipe that blows out the smoke.</p>\r\n</li>\r\n</ul>","blurb":"","authors":[{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}}],"primaryCategoryTaxonomy":{"categoryId":33776,"title":"Armed Services","slug":"armed-services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":207899,"title":"ASVAB: 1001 Practice Questions For Dummies Cheat Sheet","slug":"1001-asvab-practice-questions-for-dummies-cheat-sheet","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/207899"}},{"articleId":164183,"title":"Following an ASVAB Study Schedule","slug":"following-an-asvab-study-schedule","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/164183"}},{"articleId":164180,"title":"4 Ways to Fine-Tune Specific ASVAB Study Areas","slug":"4-ways-to-fine-tune-specific-asvab-study-areas","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/164180"}}],"fromCategory":[{"articleId":295645,"title":"What Is the ASVAB Test?","slug":"what-is-the-asvab-test","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/295645"}},{"articleId":283798,"title":"Mastering the Science of Movement Training for the ACFT","slug":"mastering-the-science-of-movement-training-for-the-acft","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283798"}},{"articleId":283793,"title":"ACFT Event: Two-Mile Run","slug":"acft-event-two-mile-run","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283793"}},{"articleId":283786,"title":"ACFT Event: Leg Tuck","slug":"acft-event-leg-tuck","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283786"}},{"articleId":283778,"title":"ACFT Event: Sprint-Drag-Carry","slug":"acft-event-sprint-drag-carry","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283778"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281914,"slug":"1001-asvab-practice-questions-for-dummies-free-online-practice","isbn":"9781394174249","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"amazon":{"default":"//www.amazon.com/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394174241-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/asvab-1001-practice-questions-for-dummies-2nd-edition-cover-1394174241-203x255.jpg","width":203,"height":255},"title":"ASVAB: 1001 Practice Questions For Dummies (+ Online Practice)","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b><b data-author-id=\"9112\">Rod Powers</b></b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. <p><b><b data-author-id=\"11018\">Angie Papple Johnston</b></b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant.</p>","authors":[{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}},{"authorId":11018,"name":"Angie Papple Johnston","slug":"angie-papple-johnston","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11018"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394174249&quot;]}]\" id=\"du-slot-6530478f0cf66\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394174249&quot;]}]\" id=\"du-slot-6530478f0d4c6\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Five years","lifeExpectancySetFrom":"2024-10-18T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":164184},{"headers":{"creationTime":"2017-03-26T14:38:09+00:00","modifiedTime":"2024-10-18T20:38:30+00:00","timestamp":"2024-10-18T21:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"Armed Services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"},"slug":"armed-services","categoryId":33776}],"title":"Following an ASVAB Study Schedule","strippedTitle":"following an asvab study schedule","slug":"following-an-asvab-study-schedule","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"Follow this schedule for studying for the ASVAB to ensure you're covering everything and have practiced enough to be ready for the exam.","noIndex":0,"noFollow":0},"content":"An ASVAB study schedule is imperative to your success. No matter how many days are left until test day, you can use this guide to help structure your plan. If you’re a few months out, use this study guide and take your time to really pinpoint the areas that need the most attention.\r\n\r\nIf you don’t have much time to spare, jump to the end of this schedule, pump out that extra effort, and eat, sleep, and breathe ASVAB from now until test day!\r\n<h2 id=\"tab1\" >One month before test day</h2>\r\nYou have 30 days until test day. Let the studying begin!\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Take an ASVAB practice exam and score yourself on each subtest.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Rank each subtest: 1 through 4 for each AFQT subtest (Word Knowledge, Paragraph Comprehension, Mathematics Knowledge, and Arithmetic Reasoning), and 1 through 5 for the specialty subtests, with 1 being the lowest rank.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Spend the most time studying for the areas you ranked the lowest, giving special attention to the AFQT subjects, such as Mathematics Knowledge and Arithmetic Reasoning. For the remainder of your time, concentrate on the specialty subjects, such as Electronics Information, especially if you know your desired military jobs require a specific score, or if you want to ace the ASVAB.</p>\r\n</li>\r\n</ul>\r\n<h2 id=\"tab2\" >Two weeks before test day</h2>\r\nYou’re in the home stretch. Try not to get nervous if you don’t know some of the material as well as you’d like. Use these strategies to boost your confidence:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Take the same ASVAB practice exam you took at the beginning of your study plan, scoring each subtest the same way as before.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Compare your new (and hopefully improved) practice test scores to the original scores.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Note any improvements you’ve made within each subtest.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Note the struggles you’re having in specific areas and write them down. For example, you may still have a hard time dividing fractions, memorizing planets, identifying vehicle parts, or learning suffixes.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Spend the next two weeks fine-tuning the areas that need improvement.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">If you scored very high on any specific subtest (as in, you missed only one or two questions), set aside your review of that material in favor of spending time on topics that you still feel shaky about.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Periodically check your ASVAB growth by trying out another practice test so you can see your progress.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Feel confident that your hard work will pay off and don’t give up.</p>\r\n</li>\r\n</ul>\r\n<b><i>Note:</i></b> If you’re just now starting to study for the ASVAB, don’t panic. Take a practice exam and score each subtest to see where you need to focus your time in the next two weeks. Then get studying!\r\n<h2 id=\"tab3\" >One day before test day</h2>\r\nIf there were ever a time not to stress, this is it. Follow these suggestions to prepare for the big day:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Relax and enjoy your day because the last thing you need is built-up anxiety.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Pack up everything you need to take the test, such as your ID card, any necessary paperwork, directions to the test site, lip balm, reading glasses, car keys, and so on, and be sure to set your alarm.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Break down your final study review into two one-hour sessions:</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\">During the first hour, concentrate on your weak subjects. Read over the types of questions and the work you’ve done to prepare for them. Then take a break.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">During the second hour, look over the highlights and any notes you have for each subtest.</p>\r\n</li>\r\n</ul>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Stay hydrated with plenty of water.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Get at least eight hours of rest.</p>\r\n</li>\r\n</ul>","description":"An ASVAB study schedule is imperative to your success. No matter how many days are left until test day, you can use this guide to help structure your plan. If you’re a few months out, use this study guide and take your time to really pinpoint the areas that need the most attention.\r\n\r\nIf you don’t have much time to spare, jump to the end of this schedule, pump out that extra effort, and eat, sleep, and breathe ASVAB from now until test day!\r\n<h2 id=\"tab1\" >One month before test day</h2>\r\nYou have 30 days until test day. Let the studying begin!\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Take an ASVAB practice exam and score yourself on each subtest.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Rank each subtest: 1 through 4 for each AFQT subtest (Word Knowledge, Paragraph Comprehension, Mathematics Knowledge, and Arithmetic Reasoning), and 1 through 5 for the specialty subtests, with 1 being the lowest rank.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Spend the most time studying for the areas you ranked the lowest, giving special attention to the AFQT subjects, such as Mathematics Knowledge and Arithmetic Reasoning. For the remainder of your time, concentrate on the specialty subjects, such as Electronics Information, especially if you know your desired military jobs require a specific score, or if you want to ace the ASVAB.</p>\r\n</li>\r\n</ul>\r\n<h2 id=\"tab2\" >Two weeks before test day</h2>\r\nYou’re in the home stretch. Try not to get nervous if you don’t know some of the material as well as you’d like. Use these strategies to boost your confidence:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Take the same ASVAB practice exam you took at the beginning of your study plan, scoring each subtest the same way as before.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Compare your new (and hopefully improved) practice test scores to the original scores.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Note any improvements you’ve made within each subtest.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Note the struggles you’re having in specific areas and write them down. For example, you may still have a hard time dividing fractions, memorizing planets, identifying vehicle parts, or learning suffixes.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Spend the next two weeks fine-tuning the areas that need improvement.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">If you scored very high on any specific subtest (as in, you missed only one or two questions), set aside your review of that material in favor of spending time on topics that you still feel shaky about.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Periodically check your ASVAB growth by trying out another practice test so you can see your progress.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Feel confident that your hard work will pay off and don’t give up.</p>\r\n</li>\r\n</ul>\r\n<b><i>Note:</i></b> If you’re just now starting to study for the ASVAB, don’t panic. Take a practice exam and score each subtest to see where you need to focus your time in the next two weeks. Then get studying!\r\n<h2 id=\"tab3\" >One day before test day</h2>\r\nIf there were ever a time not to stress, this is it. Follow these suggestions to prepare for the big day:\r\n<ul class=\"level-one\">\r\n \t<li>\r\n<p class=\"first-para\">Relax and enjoy your day because the last thing you need is built-up anxiety.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Pack up everything you need to take the test, such as your ID card, any necessary paperwork, directions to the test site, lip balm, reading glasses, car keys, and so on, and be sure to set your alarm.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Break down your final study review into two one-hour sessions:</p>\r\n\r\n<ul class=\"level-two\">\r\n \t<li>\r\n<p class=\"first-para\">During the first hour, concentrate on your weak subjects. Read over the types of questions and the work you’ve done to prepare for them. Then take a break.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">During the second hour, look over the highlights and any notes you have for each subtest.</p>\r\n</li>\r\n</ul>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Stay hydrated with plenty of water.</p>\r\n</li>\r\n \t<li>\r\n<p class=\"first-para\">Get at least eight hours of rest.</p>\r\n</li>\r\n</ul>","blurb":"","authors":[{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}}],"primaryCategoryTaxonomy":{"categoryId":33776,"title":"Armed Services","slug":"armed-services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"One month before test day","target":"#tab1"},{"label":"Two weeks before test day","target":"#tab2"},{"label":"One day before test day","target":"#tab3"}],"relatedArticles":{"fromBook":[{"articleId":207899,"title":"ASVAB: 1001 Practice Questions For Dummies Cheat Sheet","slug":"1001-asvab-practice-questions-for-dummies-cheat-sheet","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/207899"}},{"articleId":164184,"title":"10 Ways to Memorize Information for the ASVAB","slug":"10-ways-to-memorize-information-for-the-asvab","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/164184"}},{"articleId":164180,"title":"4 Ways to Fine-Tune Specific ASVAB Study Areas","slug":"4-ways-to-fine-tune-specific-asvab-study-areas","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/164180"}}],"fromCategory":[{"articleId":295645,"title":"What Is the ASVAB Test?","slug":"what-is-the-asvab-test","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/295645"}},{"articleId":283798,"title":"Mastering the Science of Movement Training for the ACFT","slug":"mastering-the-science-of-movement-training-for-the-acft","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283798"}},{"articleId":283793,"title":"ACFT Event: Two-Mile Run","slug":"acft-event-two-mile-run","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283793"}},{"articleId":283786,"title":"ACFT Event: Leg Tuck","slug":"acft-event-leg-tuck","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283786"}},{"articleId":283778,"title":"ACFT Event: Sprint-Drag-Carry","slug":"acft-event-sprint-drag-carry","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283778"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281914,"slug":"1001-asvab-practice-questions-for-dummies-free-online-practice","isbn":"9781394174249","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"amazon":{"default":"//www.amazon.com/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394174241-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394174241/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/asvab-1001-practice-questions-for-dummies-2nd-edition-cover-1394174241-203x255.jpg","width":203,"height":255},"title":"ASVAB: 1001 Practice Questions For Dummies (+ Online Practice)","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b><b data-author-id=\"9112\">Rod Powers</b></b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. <p><b><b data-author-id=\"11018\">Angie Papple Johnston</b></b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant.</p>","authors":[{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}},{"authorId":11018,"name":"Angie Papple Johnston","slug":"angie-papple-johnston","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11018"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394174249&quot;]}]\" id=\"du-slot-6530478f067d5\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394174249&quot;]}]\" id=\"du-slot-6530478f06d6a\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Five years","lifeExpectancySetFrom":"2024-10-18T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":164183},{"headers":{"creationTime":"2019-01-13T05:42:21+00:00","modifiedTime":"2024-10-18T17:36:07+00:00","timestamp":"2024-10-18T18:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Academics & The Arts","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33662"},"slug":"academics-the-arts","categoryId":33662},{"name":"Study Skills & Test Prep","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33772"},"slug":"study-skills-test-prep","categoryId":33772},{"name":"Armed Services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"},"slug":"armed-services","categoryId":33776}],"title":"Solving Real-World Math Problems on the ASVAB AFQT","strippedTitle":"solving real-world math problems on the asvab afqt","slug":"solving-real-world-problems-asvab-afqt","canonicalUrl":"","搜所领头羊改进":{"metaDescription":"Some math problems on the ASVAB AFQT exam require you to know which formulas can solve certain real-world word problems.","noIndex":0,"noFollow":0},"content":"Some math problems on the ASVAB AFQT will require you to apply formulas to solve real-world problems. It's important to not only be familiar with these formulas, but also to know when and how to apply them.\r\n<h2 id=\"tab1\" >Practice exercise</h2>\r\nIn the following practice exercise, you need to match the word problem to the appropriate formula. (You don't actually need to solve the problems—this exercise is just to test your ability to choose the right formula.) When you're finished, check the \"Answers and explanations\" that follow.\r\n\r\n<img class=\"alignnone size-full wp-image-248779\" src=\"//coursofppt.com/wp-content/uploads/ASVAB_AFQT_1901.jpg\" alt=\"SVAB_AFQT_1901\" width=\"449\" height=\"487\" />\r\n<h2 id=\"tab2\" >Answers and explanations</h2>\r\n<ol>\r\n \t<li>The correct answer is Choice E.The problem asks you to find the circumference of a circle, and the formula for that is\r\n\r\n<img class=\"alignnone size-full wp-image-248780\" src=\"//coursofppt.com/wp-content/uploads/ASVAB_AFQT_1902.jpg\" alt=\"ASVAB_AFQT_1902\" width=\"63\" height=\"20\" />\r\n\r\nwhere <em>C</em> represents circumference and <em>r</em> represents the circle's radius. Remember, the radius of a circle is half its diameter.</li>\r\n \t<li>The correct answer is Choice C.The formula to solve a work problem that asks you how long it will take two people together to accomplish a task is\r\n\r\n<img class=\"alignnone size-full wp-image-248781\" src=\"//coursofppt.com/wp-content/uploads/ASVAB_AFQT_1903.jpg\" alt=\"ASVAB_AFQT_1903\" width=\"43\" height=\"47\" /></li>\r\n \t<li>The correct answer is Choice A.Investment and loan problems can typically be solved with the interest formula, which is <em>I</em> = <em>prt</em>. <em>I</em> stands for interest, <em>p</em> represents the principal, <em>r</em> represents the interest rate, and <em>t</em> represents the amount of time you're evaluating.</li>\r\n \t<li>The correct answer is Choice B.When a problem asks you, \"How many square feet … ,\" it's looking for an area. The formula for the area of a rectangle is <em>A</em> = <em>lw,</em> where <em>A</em> represents area, <em>l</em> represents length, and <em>w</em> represents width.</li>\r\n \t<li>The correct answer is Choice D.In this problem, you need to use the formula for the volume of a cube, which is <em>V</em> = <em>s</em><sup>3</sup>, where <em>V</em> represents volume and <em>s</em> represents the length of a side.</li>\r\n</ol>","description":"Some math problems on the ASVAB AFQT will require you to apply formulas to solve real-world problems. It's important to not only be familiar with these formulas, but also to know when and how to apply them.\r\n<h2 id=\"tab1\" >Practice exercise</h2>\r\nIn the following practice exercise, you need to match the word problem to the appropriate formula. (You don't actually need to solve the problems—this exercise is just to test your ability to choose the right formula.) When you're finished, check the \"Answers and explanations\" that follow.\r\n\r\n<img class=\"alignnone size-full wp-image-248779\" src=\"//coursofppt.com/wp-content/uploads/ASVAB_AFQT_1901.jpg\" alt=\"SVAB_AFQT_1901\" width=\"449\" height=\"487\" />\r\n<h2 id=\"tab2\" >Answers and explanations</h2>\r\n<ol>\r\n \t<li>The correct answer is Choice E.The problem asks you to find the circumference of a circle, and the formula for that is\r\n\r\n<img class=\"alignnone size-full wp-image-248780\" src=\"//coursofppt.com/wp-content/uploads/ASVAB_AFQT_1902.jpg\" alt=\"ASVAB_AFQT_1902\" width=\"63\" height=\"20\" />\r\n\r\nwhere <em>C</em> represents circumference and <em>r</em> represents the circle's radius. Remember, the radius of a circle is half its diameter.</li>\r\n \t<li>The correct answer is Choice C.The formula to solve a work problem that asks you how long it will take two people together to accomplish a task is\r\n\r\n<img class=\"alignnone size-full wp-image-248781\" src=\"//coursofppt.com/wp-content/uploads/ASVAB_AFQT_1903.jpg\" alt=\"ASVAB_AFQT_1903\" width=\"43\" height=\"47\" /></li>\r\n \t<li>The correct answer is Choice A.Investment and loan problems can typically be solved with the interest formula, which is <em>I</em> = <em>prt</em>. <em>I</em> stands for interest, <em>p</em> represents the principal, <em>r</em> represents the interest rate, and <em>t</em> represents the amount of time you're evaluating.</li>\r\n \t<li>The correct answer is Choice B.When a problem asks you, \"How many square feet … ,\" it's looking for an area. The formula for the area of a rectangle is <em>A</em> = <em>lw,</em> where <em>A</em> represents area, <em>l</em> represents length, and <em>w</em> represents width.</li>\r\n \t<li>The correct answer is Choice D.In this problem, you need to use the formula for the volume of a cube, which is <em>V</em> = <em>s</em><sup>3</sup>, where <em>V</em> represents volume and <em>s</em> represents the length of a side.</li>\r\n</ol>","blurb":"","authors":[{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}}],"primaryCategoryTaxonomy":{"categoryId":33776,"title":"Armed Services","slug":"armed-services","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33776"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Practice exercise","target":"#tab1"},{"label":"Answers and explanations","target":"#tab2"}],"relatedArticles":{"fromBook":[{"articleId":248835,"title":"How To Save Time on the ASVAB AFQT Math Exam","slug":"use-commutative-associative-properties-speed-asvab-afqt","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248835"}},{"articleId":248829,"title":"Solving Percent Problems on the ASVAB AFQT","slug":"solving-percent-problems-asvab-afqt","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248829"}},{"articleId":248826,"title":"ASVAB AFQT Practice: Identifying Formulas","slug":"asvab-afqt-practice-identifying-formulas","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248826"}},{"articleId":248823,"title":"Solving Equations and Inequalities on the ASVAB AFQT","slug":"solving-equations-inequalities-asvab-afqt","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248823"}},{"articleId":248820,"title":"Order of Operations: ASVAB AFQT Practice Questions","slug":"order-operations-asvab-afqt-practice-questions","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/248820"}}],"fromCategory":[{"articleId":295645,"title":"What Is the ASVAB Test?","slug":"what-is-the-asvab-test","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/295645"}},{"articleId":283798,"title":"Mastering the Science of Movement Training for the ACFT","slug":"mastering-the-science-of-movement-training-for-the-acft","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283798"}},{"articleId":283793,"title":"ACFT Event: Two-Mile Run","slug":"acft-event-two-mile-run","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283793"}},{"articleId":283786,"title":"ACFT Event: Leg Tuck","slug":"acft-event-leg-tuck","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283786"}},{"articleId":283778,"title":"ACFT Event: Sprint-Drag-Carry","slug":"acft-event-sprint-drag-carry","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/283778"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281964,"slug":"asvab-afqt-for-dummies-book-8-practice-tests-online-3rd-edition","isbn":"9781119413653","categoryList":["academics-the-arts","study-skills-test-prep","armed-services"],"amazon":{"default":"//www.amazon.com/gp/product/1119413656/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1119413656/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1119413656-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1119413656/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1119413656/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/asvab-afqt-for-dummies-book-3rd-edition-cover-9781119413653-199x255.jpg","width":199,"height":255},"title":"ASVAB AFQT For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<p><b data-author-id=\"11018\">Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she's the CBRN noncommissioned officer-in-charge of an aviation battalion in Washington, D.C. <b data-author-id=\"9112\">Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. </p>","authors":[{"authorId":11018,"name":"Angie Papple Johnston","slug":"angie-papple-johnston","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11018"}},{"authorId":9112,"name":"Rod Powers","slug":"rod-powers","description":" <p><b>Angie Papple Johnston</b> joined the U.S. Army in 2006 as a CBRN specialist. Currently, she&#39;s the CBRN noncommissioned officer&#45;in&#45;charge of an aviation battalion in Washington, D.C. <b>Rod Powers</b> served more than 20 years in the U.S. Air Force and retired as a first sergeant. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9112"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119413653&quot;]}]\" id=\"du-slot-65301d5f3149d\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;academics-the-arts&quot;,&quot;study-skills-test-prep&quot;,&quot;armed-services&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119413653&quot;]}]\" id=\"du-slot-65301d5f319b3\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2024-10-18T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":248832}],"_links":{"self":{"self":"//dummies-api.coursofppt.com/v2/categories/33772/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"//dummies-api.coursofppt.com/v2/categories/33772/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"//dummies-api.coursofppt.com/v2/categories/33772/categoryArticles?sortField=time&sortOrder=1&size=10&offset=1739"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33772","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":1727},{"itemId":33774,"itemName":"ACCUPLACER","count":6},{"itemId":33775,"itemName":"ACT","count":85},{"itemId":33776,"itemName":"Armed Services","count":272},{"itemId":34392,"itemName":"CCSP","count":9},{"itemId":33777,"itemName":"CISSP","count":69},{"itemId":33778,"itemName":"Citizenship Tests","count":1},{"itemId":33773,"itemName":"CompTIA A+","count":39},{"itemId":33779,"itemName":"CompTIA PenTest+","count":11},{"itemId":33780,"itemName":"CPA Exam","count":61},{"itemId":33782,"itemName":"EMT Exam","count":107},{"itemId":33783,"itemName":"GED","count":109},{"itemId":33799,"itemName":"General Study Skills & Test Prep","count":34},{"itemId":33784,"itemName":"GMAT","count":28},{"itemId":33785,"itemName":"GRE","count":41},{"itemId":33786,"itemName":"LSAT","count":72},{"itemId":33787,"itemName":"MAT","count":78},{"itemId":33788,"itemName":"NCLEX-RN","count":10},{"itemId":33789,"itemName":"Officer Candidate Tests","count":4},{"itemId":33790,"itemName":"PHR/SPHR Exam","count":63},{"itemId":33791,"itemName":"Physician Assistant Exam","count":183},{"itemId":34326,"itemName":"PMP Certification","count":139},{"itemId":33792,"itemName":"Police Officer Exam","count":6},{"itemId":34340,"itemName":"PSAT","count":42},{"itemId":33793,"itemName":"Real Estate Licensure Exam","count":87},{"itemId":33794,"itemName":"SAT","count":59},{"itemId":33795,"itemName":"Securities Industry Essentials Exam","count":16},{"itemId":33796,"itemName":"Series 7 Exam","count":57},{"itemId":33797,"itemName":"SSAT & ISEE","count":7},{"itemId":33772,"itemName":"Study Skills & Test Prep","count":2},{"itemId":33798,"itemName":"TASC","count":30}],"articleTypeFilter":[{"articleType":"All Types","count":1727},{"articleType":"Articles","count":1678},{"articleType":"Cheat Sheet","count":46},{"articleType":"Step by Step","count":3}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2025-03-04T05:50:01+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"//cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"//sb\" : \"//b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"//sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"//zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for //coursofppt.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'//static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"//www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"navigationState":{"navigationCollections":[{"collectionId":287568,"title":"BYOB (Be Your Own Boss)","hasSubCategories":false,"url":"/collection/for-the-entry-level-entrepreneur-287568"},{"collectionId":293237,"title":"Be a Rad Dad","hasSubCategories":false,"url":"/collection/be-the-best-dad-293237"},{"collectionId":295890,"title":"Career Shifting","hasSubCategories":false,"url":"/collection/career-shifting-295890"},{"collectionId":294090,"title":"Contemplating the Cosmos","hasSubCategories":false,"url":"/collection/theres-something-about-space-294090"},{"collectionId":287563,"title":"For Those Seeking Peace of Mind","hasSubCategories":false,"url":"/collection/for-those-seeking-peace-of-mind-287563"},{"collectionId":287570,"title":"For the Aspiring Aficionado","hasSubCategories":false,"url":"/collection/for-the-bougielicious-287570"},{"collectionId":291903,"title":"For the Budding Cannabis Enthusiast","hasSubCategories":false,"url":"/collection/for-the-budding-cannabis-enthusiast-291903"},{"collectionId":299891,"title":"For the College Bound","hasSubCategories":false,"url":"/collection/for-the-college-bound-299891"},{"collectionId":291934,"title":"For the Exam-Season Crammer","hasSubCategories":false,"url":"/collection/for-the-exam-season-crammer-291934"},{"collectionId":301547,"title":"For the Game Day Prepper","hasSubCategories":false,"url":"/collection/big-game-day-prep-made-easy-301547"}],"navigationCollectionsLoadedStatus":"success","navigationCategories":{"books":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/books/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/books/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/books/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/books/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/books/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/books/level-0-category-0"}},"articles":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/articles/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/articles/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/articles/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/articles/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/articles/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/articles/level-0-category-0"}}},"navigationCategoriesLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/study-skills-test-prep-33772/","hash":"","query":{},"params":{"category":"study-skills-test-prep-33772"},"fullPath":"/category/articles/study-skills-test-prep-33772/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"profileState":{"auth":{},"userOptions":{},"status":"success"}}
fun88 casino net cách chơi keno trực tuyến game đánh bài baccarat baccarat quốc tế sòng bài trực tuyến