Activity
Mon
Wed
Fri
Sun
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

Public • 953 • Free

22 contributions to CISSP Study Group
Passed CISSP on 11/09/24!
Hello Everyone, I passed the CISSP this past Saturday. Thank you all for your insights and coaching. Reach out to me if you want to talk, pscheuer66@outlook.com. Take care.
10
11
New comment 4d ago
Passed the exam today
Booking a date for the exam and then counting down the days, was really difficult for me to do. So, after the last group session on Thursday, I thought this would be a good time for me to test my knowledge. So yesterday I booked the exam for this afternoon and by the grace of the GOD and knowledge shared by everyone in this group and prayers of my family, I was able to successfully get through this exam. The journey was really challenging but I would like to take a moment to thank each and every one of you for your support. Special shoutout to @Josh Botz @Vincent Primiani @Clifford Jenkins @S M @M B @Sara M@Asad Anwer @Deepu Thomas
31
30
New comment 20d ago
2 likes • 20d
Congrats!
Domain 3: Public Key Infrastructure
As a Cybersecurity Progressional, you are researching a secure communication method for exchanging encryption keys only known between shared parties that is provable and guarantees security, relying only on a Shared Key encryption method to encrypt and decrypt messages. Which method would you choose?
Poll
16 members have voted
2
4
New comment 23d ago
Domain 3: Public Key Infrastructure
0 likes • 27d
#3. Quantum Key Distribution (QKD) What is Quantum Key Distribution (QKD) and How Does it Work?
Practice Question!
Jake is conducting a review of his organization's identity and access management program. During his review, he is verifying the privileges assigned to each user and ensuring that they match with business requirements. What element of the program is he reviewing?
Poll
42 members have voted
2
8
New comment 29d ago
0 likes • 29d
@Roshan Laloo “matching business” not authorization requirements.
1 like • 29d
@Deepu Thomas so, answer is 3, Authorization, correct?
Domain 1: Silicon Root of Trust
You are the Cybersecurity Professional for your organization and the CEO would like to know how the Silicon Root of Trust prevents malicious code from tampering with a server. What do you tell the CEO?
Poll
20 members have voted
3
5
New comment 18d ago
3 likes • Oct 22
Correct answer is D.
1-10 of 22
@peter-scheuermann-5954
I have over 30 years' experience in customer facing technical roles supporting Fortune 500 customers.

Active 1d ago
Joined Oct 14, 2024
powered by