Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

CISSP Study Group

1.5k members • Free

22 contributions to CISSP Study Group
Passed CISSP on 11/09/24!
Hello Everyone, I passed the CISSP this past Saturday. Thank you all for your insights and coaching. Reach out to me if you want to talk, [email protected]. Take care.
Passed the exam today
Booking a date for the exam and then counting down the days, was really difficult for me to do. So, after the last group session on Thursday, I thought this would be a good time for me to test my knowledge. So yesterday I booked the exam for this afternoon and by the grace of the GOD and knowledge shared by everyone in this group and prayers of my family, I was able to successfully get through this exam. The journey was really challenging but I would like to take a moment to thank each and every one of you for your support. Special shoutout to @Josh Botz @Vincent Primiani @Clifford Jenkins @S M @M B @Sara M@Asad Anwer @Deepu Thomas
2 likes • Nov '24
Congrats!
Domain 3: Public Key Infrastructure
As a Cybersecurity Progressional, you are researching a secure communication method for exchanging encryption keys only known between shared parties that is provable and guarantees security, relying only on a Shared Key encryption method to encrypt and decrypt messages. Which method would you choose?
Poll
18 members have voted
Domain 3: Public Key Infrastructure
0 likes • Oct '24
#3. Quantum Key Distribution (QKD) What is Quantum Key Distribution (QKD) and How Does it Work?
Practice Question!
Jake is conducting a review of his organization's identity and access management program. During his review, he is verifying the privileges assigned to each user and ensuring that they match with business requirements. What element of the program is he reviewing?
Poll
45 members have voted
0 likes • Oct '24
@Roshan Laloo “matching business” not authorization requirements.
1 like • Oct '24
@Deepu Thomas so, answer is 3, Authorization, correct?
Domain 1: Silicon Root of Trust
You are the Cybersecurity Professional for your organization and the CEO would like to know how the Silicon Root of Trust prevents malicious code from tampering with a server. What do you tell the CEO?
Poll
22 members have voted
3 likes • Oct '24
Correct answer is D.
1-10 of 22
Peter Scheuermann
3
18points to level up
@peter-scheuermann-5954
I have over 30 years' experience in customer facing technical roles supporting Fortune 500 customers.

Active 310d ago
Joined Oct 14, 2024
Powered by