Activity
Mon
Wed
Fri
Sun
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

Public • 953 • Free

30 contributions to CISSP Study Group
Need Help Choosing CISSP Study Materials: Feeling Lost and Overwhelmed
Hello, I’m feeling a bit lost regarding the materials I need to prepare for the CISSP certification. I want to get certified within a reasonable timeframe, but I don’t know where to start. Many people recommend different books, videos, and other resources, and I’d like something clear and focused to guide me. I’m looking for up-to-date materials that will give me what I need to prepare effectively without being excessive. A practical Study Guide seems like a good fit, but I’d appreciate your recommendations on what to use. Also, since I’m based in Europe, resources from the U.S. tend to be much more expensive for me. Could you suggest options that are accessible for someone living in Europe? Thank you so much for your help! Best regards.
1
16
New comment 7h ago
2 likes • 3d
Hi Parn, - LearnZapp is the official training site for the ISC2 CISSP certification, you can try it for free with limited number of questions and flashcards, then there are few subscription plans, monthly, quarterly and so forth. it is pretty good and very much has similar questions and flashcards as the ISC2 OSG by Mike Chapple. here is the link to https://isc2-learnzapp.web.app/ - You can also watch Destination Certification serious Mind Map by Rob Whitchler for all 8 domains, nice overview - CISSP EXAM CRAM by Pete Zerger https://www.youtube.com/watch?v=iEBHjVcu_8s&list=PL7XJSuT7Dq_XPK_qmYMqfiBjbtHJRWigD&index=16 - CertMike by - - Mike Chapple https://certmike.com/videos/ - https://thorteaches.com/ By Thor Pedersen I hope these training aids could be good source for you.
0 likes • 7h
@Anand Agarwal You are very welcome
Practice Question
Based on recent articles about the risk of mobile code and web apps, you want to adjust the security configurations of organizational endpoint devices to minimize the exposure. On a modern Windows system with the latest version of Microsoft's browser and all others disabled or blocked, which of the following is of the highest concern? A. Java B. Flash C. JavaScript D. ActiveX
1
1
New comment 11h ago
Practice Question
In the Biba model What is the implied meaning of the simple property of Biba? A. No Write-down B. Read up C. No write-up D. No read-down
1
5
New comment 21h ago
0 likes • 1d
@Anand Agarwal Actually that was a tricky question, as it said "Biba model What is the implied meaning" which is Read Up and Write Down. The simple property of Biba is no read-down but you can Read Up.
0 likes • 1d
@Anand Agarwal simple property of Biba No Read-Down, but implied meaning is Read-up
Public Key Cryprography
Which of the following is a vulnerability in Public Key Cryptography (PKC) that allows a chosen ciphertext attack occur?
Poll
5 members have voted
1
2
New comment 2d ago
0 likes • 2d
C. A ciphertext to choose from is unclear A chosen ciphertext attack (CCA) is a type of cryptographic attack where the attacker can choose ciphertexts and obtain their corresponding decrypted plaintexts. In public-key cryptography, this type of attack relies on certain vulnerabilities in the encryption algorithm or protocol that allow an attacker to manipulate or choose ciphertexts for decryption, gaining information about the plaintext or secret key. The vulnerability in this context is that if an attacker can choose a ciphertext and observe the result of decryption, it becomes easier to derive information about the encryption system or the plaintext, and thus compromise security.
Practice Question
Which of the following is MOST important to follow when developing information security controls for an organization? A. Use industry standard best practices for security controls in the organization. B. Exercise due diligence with regard to all risk management information to tailor appropriate controls. C. Review all local and international standards and choose the most stringent based on location. D. Perform a risk assessment and choose a standard that addresses existing gaps.
1
1
New comment 2d ago
1-10 of 30
@fouad-ahmed-2832
Cyber Security professional, very interested to learn the latest in cybersecurity world as well knowledge sharing

Active 7h ago
Joined Oct 25, 2024
Boston, MA
powered by