Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
What is this?
Less
More

Memberships

CISSP Study Group

1.3k members • Free

25 contributions to CISSP Study Group
Successfully Completed CISSP @128!
Hello Team, I’m thrilled to share that I have successfully passed the CISSP! This milestone wouldn’t have been possible without the collective effort and inspiring discussions we shared throughout our study journey in this group. Reflecting on my preparation, I found a few resources particularly valuable that I’d like to recommend: - Thoroughly reviewing official documents and guides helped build a solid foundation. *Cissp Study Guide 3rd Edition (Eric Conrad- Seth Misenar- Joshua Feldman). * ISC2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Sybex Study Guide) *11th Hour CISSP study Guide *Certified Information Systems security Professional (CISSP) Exam guide ( Ted Jordan, Ric Daza and Hinne Hettema) * https://study.pocketprep.com/study @90%, very helpful. *CISSP-Prep (Honestly, it was not helpful, and the style of questions can easily discourage your efforts) *Andrew 50 CISSP questions :https://www.youtube.com/watch?v=qbVY0Cg8Ntw * Luke's 25 CISSP Practice: https://www.youtube.com/watch?v=MHbdNMRLafA - Watched Pete Zerger: https://www.youtube.com/@InsideCloudAndSecurity - Went through all Coffee shot per domain video of Prah (Vey important and very close to exam style question) - Fully engaged and attended study sessions - Utilizing test bank resources was instrumental in familiarizing myself with the exam format and question styles. - Leveraging research engines like Perplexity proved incredibly helpful for clarifying complex concepts quickly and efficiently. Example: Please provide me with 15 CISSP-style MCQ to help you master the differences between the following protocols: SAML,OAuth,OIDC
1 like • 15d
Hey Peter - with Went through all Coffee shot per domain video of Prah - is a video pack or sheets? As I get prompted to get access to Google sheets...... TIA
1 like • 14d
Thanks for granting access, cheers
How much to study the specifics of US laws
For example, how much do I need to know about Computer Fraud and Abuse Act? Do I need to be able to compare and contrast between Electronic Communications Policy Act, and the changes, or do I just need to know general information, such as that the CFAA outline what a computer crime is?
2 likes • Mar 27
Also handy to know what types of evidence are - parol, hearsay, documentary etc. I can bet there will be at least one question come up on that - I have seen many of these types of question on test exams and they can be tricky, personal opinion obviously.
Practice Question (Domain 4- Networking)
A global financial institution is restructuring its network infrastructure to improve security and optimize bandwidth utilization. They are migrating from a flat network to a hierarchical model with multiple subnets. Their current Class B network address is 172.16.0.0/16. The security team has mandated that each department (Accounting, Sales, Marketing, and Research) must have its own subnet. Furthermore, they require a minimum of 500 usable host addresses per subnet. The network engineers are considering several subnet mask options. Which of the following subnet masks BEST meets the organization's requirements while minimizing wasted IP addresses? a) 255.255.254.0 b) 255.255.255.0 c) 255.255.255.128 d) 255.255.255.192
0 likes • Feb 5
how are the subnet bits calculated? Do we need to rote remember each type of octet range to get the answer? Is there anything in the address that can give a clue to the answer? I have studied IP addresses as part of CISCO exams in the past so I'm not entirely new to this. TIA.
Practice Question
Mark is analyzing the boundary values. Which phase of the SDLC (system development life cycle) is he currently in? a. Design b. Maintenance c. Implementation d. Requirements
0 likes • Jan 20
Analyzing boundary values is typically part of the design process, where the system's specifications and constraints are defined to ensure that it meets the required functionality and performance criteria
Practice Question
Rob initiates a three-way handshake on the server's port 443 from his port 45,234. The server responds with a port number. Which answer is MOST likely?
Poll
11 members have voted
1 like • Jan 6
Thanks for these types of questions Fouad
1-10 of 25
Tro Vis
3
45points to level up
@tro-vis-8559
Project Mgr for NIST/Essential 8 deployments

Active 1d ago
Joined May 8, 2024
powered by