Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

The Cyber Community

5.8k members • Free

CISSP Study Group

1.5k members • Free

25 contributions to CISSP Study Group
CISSP Practice Question – Security Assessment & Testing
A company’s security team is planning regular vulnerability assessments of its production systems. Management insists that business operations must not be disrupted during these tests. Which of the following approaches BEST meets this requirement? A. Run authenticated vulnerability scans against production systems during business hours. B. Conduct penetration tests against production systems once per quarter. C. Perform vulnerability scans in a staging environment that mirrors production. D. Schedule uncredentialed vulnerability scans of production systems during off-peak hours.
Passed at 100 Questions!
I’m proud to share that I’ve provisionally passed the CISSP (Certified Information Systems Security Professional) exam—and did so at the 100-question cutoff with more than 90 minutes to spare. This accomplishment was the result of months of dedicated studying, including: - Reading the Sybex Official CISSP Guide - Listening to CISSP-focused podcasts and video content - Completing countless practice exams and domain-by-domain reviews - Engaging in peer discussions and online study forums The CISSP is a rigorous exam that tests not only knowledge, but also your ability to think critically across eight diverse domains of cybersecurity. Finishing at 100 questions was both a challenging and rewarding experience. Next up: completing the endorsement process. Thank you to everyone who supported me throughout this process—your guidance and encouragement made a difference. #CISSP #CyberSecurity #InformationSecurity #ProfessionalDevelopment #CareerMilestone #SecurityLeadership
802.1X Deepdive
New Link: https://notebooklm.google.com/notebook/c7c69881-0748-4603-ad04-b39ccf306240?artifactId=d3c05cf7-96f8-4726-ac30-1b76eb25f24f Another Deepdive leveraging NotebookLM to explain 802.1X
20 min deep dive into information security models
I've noticed that many of the people in our study group and I myself still stuggle with information security models. I took some time to create a 20 min deep dive into the models using NotebookLM. Please take some time to listen to it and let me know if this helps. https://notebooklm.google.com/notebook/5bce5793-5994-4b1f-a47a-2daeb99f74ac/audio
CISSP Practice Question (Identity and Access Management (IAM) - Hard):
In a hybrid cloud environment, a company is implementing privileged access management (PAM) to secure critical systems. The company's security policy mandates the use of identity federation for single sign-on across on-premises and cloud resources. However, during the implementation phase, the security team faces a challenge in ensuring secure authentication and authorization. Which of the following strategies BEST addresses the issue? Options: A. Implementing a separate PAM solution for on-premises and cloud resources B. Enforcing multi-factor authentication (MFA) for privileged users only C. Utilizing Security Assertion Markup Language (SAML) for identity federation D. Configuring role-based access control (RBAC) with least privilege for all users
0 likes • Jul 6
C
1-10 of 25
Christopher Schneider
4
80points to level up
@christopher-schneider-1916
I'm an IT infrastructure professional and I'm currently enhancing my expertise by pursuing certifications in CISSP and Cisco CCNP.

Active 24h ago
Joined Aug 23, 2024
Homewood, Illinois
Powered by