Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Owned by Vincent

CISSP Study Group

Public • 964 • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

CISSP Study Group+

Private • 20 • $40/m

Achieve higher earnings and better jobs in IT/cyber faster! We provide the tools and community you need to make smart career decisions.

Memberships

Skool Community

Public • 183.6k • Paid

The Skool Games

Private • 22.7k • Free

Rebels 🤘😎

Private • 57 • $1/m

Gif

Private • 224 • $1/m

Skool Wellness Gym 💚

Private • 35 • $5/m

Chaos

Private • 30 • $1/m

Lead Magnet Studio

Public • 48 • Free

Tech Mentors Academy

Private • 27 • Free

Contentpreneurship.com (FREE)

Public • 7.4k • Free

374 contributions to CISSP Study Group
Practice question!
Ben has connected his laptop to his tablet PC using an 802.11ac connection. What wireless network mode has he used to connect these devices?
Poll
22 members have voted
2
2
New comment 1d ago
0 likes • 1d
[attachment]
Practice Question!
You are the security administrator for an ERP system and preparing to create accounts for several new employees. What default access should you give to all of the new employees as you create the accounts?
Poll
27 members have voted
7
4
New comment 1d ago
2 likes • 2d
[attachment]
0 likes • 1d
D it is!
🚨 LAST Day 🚨
Tomorrow (Nov 25th, by 5PM EST), is the final day to register for the community bootcamp at the discounted price of $400. The price will INCREASE to $500 for late registration. Register now by unlocking the class in the classroom.
1
0
🚨 LAST Day 🚨
TRUE statements about CISSP topics (2)
- Civil investigations typically follow the "preponderance of the evidence" standard. - SAML is an XML-based framework used to exchange user information for single sign-on(SSO) between organizations within a federated identity management system. - The Encapsulating Security Payload (ESP) protocol provides confidentiality and integrity for packet contents - VM escape protection. VM escaping occurs when software within a guest OS is able to breach the isolation protection provided by the hypervisor in order to violate the container of other guest OSs or to infiltrate a host OS. - A ticket-granting ticket (TGT) provides proof that a subject has authenticated with a key distribution center (KDC) and can request network service access
5
2
New comment 1d ago
Practice Question!
You want to distribute a large file and prefers a peer-to-peer CDN. Which of the following is the most common example of this type of technology?
Poll
23 members have voted
4
5
New comment 3d ago
2 likes • 3d
Answer is BitTorrent, like @Dave W pointed out its the most common example of a p2p content delivery network (CDN)
1-10 of 374
Vincent Primiani
6
688points to level up
@vincent-primiani-8103
Cybersecurity. The Study Group Guy.

Active 12m ago
Joined Apr 29, 2024
Tampa, FL
powered by