Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

AI Automation Society

211.6k members • Free

Cloud Tech Techniques

6.4k members • Free

30 Day MCAT

967 members • Free

CISSP Study Group

1.8k members • Free

28 contributions to CISSP Study Group
Provisionally Passed the CISSP
All glory to God. I'm pleased to announce that I provisionally passed the CISSP exam earlier today. It was a long journey with many obstacles to overcome.
Provisionally Passed the CISSP
1 like • Oct 21
Congratulations
CISSP Practice Question – Security Assessment & Testing
A company’s security team is planning regular vulnerability assessments of its production systems. Management insists that business operations must not be disrupted during these tests. Which of the following approaches BEST meets this requirement? A. Run authenticated vulnerability scans against production systems during business hours. B. Conduct penetration tests against production systems once per quarter. C. Perform vulnerability scans in a staging environment that mirrors production. D. Schedule uncredentialed vulnerability scans of production systems during off-peak hours.
0 likes • Sep 22
C
CISSP Practice Question – Asset Security
An organization is classifying its data to ensure proper handling. A security manager notices that some employees are sending sensitive financial reports through unsecured email because the classification label is not clearly understood. What is the BEST action the organization should take to address this issue? A. Enforce encryption on all outbound email by default. B. Provide mandatory training on data classification and handling requirements. C. Revise the classification scheme to use simpler and clearer labels. D. Implement a data loss prevention (DLP) solution to block unencrypted sensitive emails.
0 likes • Sep 19
D
CISSP Practice Question – Cryptography
An organization wants to implement digital signatures to ensure integrity and non-repudiation of sensitive documents exchanged between business partners. Which of the following BEST describes how a digital signature is created? A. The sender encrypts the message with their private key, and the recipient decrypts it with the sender’s public key. B. The sender hashes the message and encrypts the hash with their private key; the recipient verifies it with the sender’s public key. C. The sender encrypts the message with the recipient’s public key, and the recipient decrypts it with their private key. D. The sender hashes the message and encrypts the hash with the recipient’s public key; the recipient decrypts it with their private key.
0 likes • Sep 17
B
A big thank you to May
A big thank you to May Brooks-Kempler for sharing her expertise in today’s Masterclass, and to everyone in our community who joined and made it a success. We’re glad we could bring you this opportunity to learn directly from one of the best. Stay tuned for more exciting collaborations with May! 🙏 Please join us in thanking May in the comments. Let us know your biggest takeaway from the session.
A big thank you to May
1 like • Sep 16
Sorry @May Brooks , I couldn't join today. Could I get a link to the recording?
1-10 of 28
Mani J
2
13points to level up
@mani-j-7751
Preparing for my exams

Active 28d ago
Joined Jul 23, 2025
Centreville, VA
Powered by