Activity
Mon
Wed
Fri
Sun
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
What is this?
Less
More

Memberships

CISSP Study Group

Public • 483 • Free

CISSP Study Group+

Private • 23 • $20/m

34 contributions to CISSP Study Group
Domain 2 Question
Which is the BEST way to wipe out a sensitive data stored on a remote storage medium
Poll
13 members have voted
2
6
New comment 19h ago
1 like • 1d
I'm thinking A or D. With the way security is growing, it seems like the delete method of the remote management console would have a good understanding of ways to wipe sensitive data, however, D may have a variety of ways to wipe the sensitive data.
0 likes • 1d
@S M and that is what I was taking into consideration. B) Encrypting the data, leavs it there and with the advancement of technology 128/256 Bit encryption may soon be "not enough".
Practice Question (not mine)
A specially crafted attack has demonstrated a significant flaw in a cryptographic protocol used in your organization to secure data in motion. The protocol is currently configured to allow its predecessor version as a fallback for backwards compatibility. The attack takes advantage of the implementation flaws of CBC encryption modes in the fallback mechanism. What would be the first step to immediately resolve this vulnerability? A. Upgrade the cryptographic protocol B. Stop using the fallback protocol C. Disable backwards compatibility D. Confirm vulnerability
2
9
New comment 4d ago
0 likes • 6d
I'm going with D. Just because a "specially crafted" (who determined this) flaw showed something. Looking at Akhil and Will's answer, there may be some legacy systems and has the whole situation been verified? Think before you act. To me, D seems like the first thing to do.
Some really inspirational video shorts by Luke Ahmed
https://www.youtube.com/shorts/POKqTe2gies https://www.youtube.com/shorts/EcOFMfteABg https://www.youtube.com/shorts/mW3hKvP2Pg8 https://www.youtube.com/shorts/DGO150H_IQw https://www.youtube.com/shorts/jiN8d28DnPg https://www.youtube.com/shorts/YnY6q8FdNBo https://www.youtube.com/shorts/qgK4coPxGvw https://www.youtube.com/shorts/RtjTq2mnOAk https://www.youtube.com/shorts/ptfJdK_eEdM https://www.youtube.com/shorts/8DijxbZcRrY And, don't forget to do this https://www.youtube.com/shorts/tghpg-BCJbA https://www.youtube.com/shorts/LEnPl4C3tIY
1
0
Some really inspirational video shorts by Luke Ahmed
NIST SP 800-53
The Appendix with alphabetical listings of vocabulary and acronyms alone are extremely valuable in my opinion.
5
0
AI generated practice questions Link
Hey All. Someone posted links to an AI site where you can generate test questions. I believe there were three options. My PC rebooted, and I couldn't save the link. Can someone repost it?
2
6
New comment 7d ago
0 likes • 7d
I like that someone added to this. The "prompt engineering technique" is good to know. This is a living, malleable document that may be altered to address specific training focus.
1-10 of 34
@clifford-jenkins-5337
Studying to sit for my CISSP in August.

Online now
Joined May 24, 2024
Redmond, WA
powered by