Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

Public • 976 • Free

55 contributions to CISSP Study Group
Provisionally Passed at 107!
Thanks to @Vincent Primiani and everyone on this platform! Key take away : put your effort and leave the rest to the universe! I took Paul as my role model thanks @Paul Frederick
11
12
New comment 4h ago
1 like • 13h
Congratulations!
Practice Question! (Security models 🤯)
Match the following numbered security models with the appropriate lettered security descriptions: Security models: 1. Clark-Wilson 2. Bell-LaPadula 3. Biba Descriptions: A. This model blocks lower-classified objects from accessing higher-classified objects, thus ensuring confidentiality. B. The * property of this model can be summarized as “no write-up.” C. This model uses security labels to grant access to objects via transformation procedures and a restricted interface model.
4
5
New comment 2d ago
1 like • 2d
1.C 2.A 3.B
Passed CCSP Exam
Hi all. I'm glad to share that I've provisionally passed the CCSP exam, in no small part because of the helpfulness and support of this group. The exam itself was not easy at all, probably the toughest exam I've ever written. So again thank you all for sharing experiences, practice questions, and comments. On to the CISSP!
12
7
New comment 2d ago
2 likes • 3d
Congratulations!
Practice Question
The security architect is designing and implementing an internal certification authority (CA) to generate digital certificates for all employees. Which of the following is the BEST solution to securely store the private keys? A. Physically secured storage device B. Trusted Platform Module (TPM) C. Encrypted flash drive D. Public key infrastructure (PKI)
1
2
New comment 4d ago
0 likes • 4d
B
Practice Question
Which of the following attacks, if successful, could give an intruder complete control of a software-defined networking (SDN) architecture? A. A brute force password attack on the Secure Shell (SSH) port of the controller B. Sending control messages to open a flow that does not pass a firewall from a compromised host within the network C. Remote Authentication Dial-In User Service (RADIUS) token replay attack D. Sniffing the traffic of a compromised host inside the network
3
4
New comment 3d ago
0 likes • 4d
A
1-10 of 55
@brandis-matthews-3677
Cyber isn't so nerdy anymore. It's cool.

Active 34m ago
Joined Aug 12, 2024
powered by