Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CISSP Study Group

Public • 1k • Free

55 contributions to CISSP Study Group
Provisionally Passed at #100 the 24th
Adrenaline rush, this morning I passed 😅 , what did I use? Al Whole lott, 🤯 perhaps I'm unable to inclusive all, i divide it in 2 parts.. quantitative and qualitative ;) Qualitative : - First global overview with the Pete Youtube Video's (feel the knowledge needed, can I do it..) - Started first Learnzapp assement, which domains are shortage in knowledge - Get the official study guide (10th Edition) it covers new territory - Breakdown the learning 'blackspots' subjects, domain after domain. So I selected in learnzap 1 domain after the other. - Take notice of the Best Practice tips, eliminating, sesamstreat, (in the exam I found myself on a Time Stress path...) - On of my black spots (during Learnzapp) was to select multiple answer where it says "All that apply" - Took my own time to read every answer and really understand each answer on each question. Why it is what it is - Discussion with Chatgpt about the English Grammer / Meaning, I was struggling some words. Quantitative - Mainly I used learnzap, 25 questions in the "Apps Smart Logic" it envolves - To add the more 'strange' hard questions I added : - Andrew https://www.youtube.com/watch?v=qbVY0Cg8Ntw Paused the question answered first myself - Halfway I discovered "CISSP Study Group" from Vincent, valuable information!! 😀 - Gwen https://www.udemy.com/course/cissp-mock-exams-master-all-8-domains/ - I partly used Mike Chapple on Linkedln - to much video's to slow, even on 1.75 speed. - I loved the free video's on https://destcert.com/ During the study I noticed myself in conflict with answers from Andrew / Gwen / Pete etc etc. I think it could be me.... So to be sure, I only tried to find an answer in the Official Study guide, not in the Last Mile from Peter of DestCert material. It's older, so my idea was, look it up in the official one and make my own choice, imagination.
4
5
New comment 3h ago
Provisionally Passed at #100 the 24th
Practice Question
Rymar Tech is in a position to acquire a sports agency for $8.24 billion. The CFO will create the financial statements of the agency's tangible and intangible assets, goodwill, liabilities, and total purchase price. The documents will be sent to the legal and accounting team of both companies who will perform their due diligence. After agreement, the documents will be formally approved by the CEOs of both entities. The security requirements are that all financial statements, records, and contracts are protected from alteration. Neither party is to directly modify, send, or receive any documents on their own. A custom system application is currently being created to facilitate this process and meet the security objectives. Which security model should be used for the system? A Clark-Wilson B Bell-LaPadula C Brewer and Nash D Biba
0
1
New comment 4d ago
Practice Question
Peter is reviewing the remote access technologies used by his organization and would like to eliminate the use of any techniques that do not include built-in encryption. Which of the following approaches should he retain? (Select all that apply.) A RDP B Telnet C SSH D Dial-up
0
4
New comment 6d ago
0 likes • 7d
Confusing question, so in the first line it says "Which one to Eliminate" and in the Second line in states "Which to retain".
Practice Question
Which application type is considered high risk and provides a common way for malware and viruses to enter a network?
Poll
9 members have voted
0
2
New comment 6d ago
1 like • 7d
B - I'm getting old 😅 back in the days, Napster, Limewire...aaarghhh
Practice Question
An organization maintains a minimum set of recommended settings for each security control to safeguard the Confidentiality, Integrity, and Availability (CIA) of information and information assets. The organization also performs scoping and tailoring activities to meet the security properties of a given configuration. Which of the following BEST describes the situation outlined in the scenario? A Security guidelines B Security baselines C Security standards D Security procedure
2
5
New comment 6d ago
2 likes • 8d
Yes B is correct: Security baselines provide minimum recommended settings and configuration requirements for security controls in an organization. Option A is incorrect as the security guideline defines recommendations the organization may consider for safeguarding its assets but does not set minimum requirements. Option C is incorrect. Security standards, on the other hand, define mandatory security controls, technologies, secure protocols, and best practices that an organization must adopt to protect assets but do not specifically address minimum security requirements. While a security procedure states the step-by-step actions the organization must undertake to secure its assets as per the standard and policy, it does not specify the minimum requirements, thus making option D incorrect.
1-10 of 55
@tom-de-tukker-9919
ICT Engineer / Ⓢⓔⓒⓤⓡⓘ ⓣⓨ / Sysops / KQL / Ⓟⓡⓘⓥⓐⓒⓨ

Active 2d ago
Joined Dec 1, 2024
powered by