Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

CISSP Study Group

1.5k members • Free

10 contributions to CISSP Study Group
Practice Question
During a forensic investigation, you discover a file named "passwords.txt" on a compromised workstation. It appears to contain a list of usernames and passwords. What is the MOST important step to take regarding this file? a) Open the file to verify the contents and determine the scope of the potential breach. b) Immediately delete the file to prevent further unauthorized access. c) Securely copy the file to a separate forensic workstation for analysis, ensuring chain of custody. d) Encrypt the file in place and notify the system administrator to change all listed passwords.
1 like • Feb 18
C
Practice Question
A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system . What PRIMARY action should be taken to improve SIEM performance? A. Implement role-based system monitoring B. Audit firewall logs to identify the source of login attempts C. Enhance logging detail D. Confirm alarm thresholds
1 like • Feb 10
B. I think is this option because is necessary to evaluate b4 set up an alarm
2 likes • Feb 10
But, what is the real answer?
Practice Question
An organization is implementing a new authentication system that requires strong security and non-repudiation. Which of the following authentication methods BEST fulfills these requirements? A) Using passwords with complex password policies and regular password changes B) Implementing multi-factor authentication (MFA) using one-time passwords (OTPs) sent via SMS C) Employing digital certificates with a public key infrastructure (PKI) D) Utilizing biometric authentication based on fingerprint scanning
0 likes • Feb 10
A. For me is the best answer from the others. B. SMS Is NOT recommended. C. Dunno how it could help with authentication methods. D. Fingerprints can also be counterfeited. But what Is the real answer?
Cleared CISSP
Hello all happy to share that I took CISSP exam for the first time today and cleared it Thank you all for your advice and best practice recommendations- helped me tremendously
1 like • Feb 9
@Vidya Shankaran congratulations!!!. Do you believe is it necessary another source besides Learnzapp??
Practice Question
Domain 1: Security and Risk Management What is the PRIMARY purpose of a business impact analysis (BIA) in a risk management program? A. To identify critical business processes and the impact of disruptions B. To calculate the likelihood of potential threats occurring C. To implement countermeasures for all identified risks D. To evaluate the effectiveness of the incident response team
1 like • Jan 29
A
1-10 of 10
Martín Figueroa
2
4points to level up
@martin-figueroa-6949
Cibersecurity

Active 96d ago
Joined May 4, 2024
Powered by