Activity
Mon
Wed
Fri
Sun
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

Public • 957 • Free

13 contributions to CISSP Study Group
Topic of the Day: Types of Read-Only Memory (ROM)
Masked ROM (MROM) · It contains a pre-programmed set of data and instructions burnt onto the chip during the manufacturing process. · The information once written cannot be changed. Programmable ROM (PROM) · It is manufactured as a blank chip which can be programmed using a special device called a PROM programmer or PROM burner. · Once programmed, its contents cannot be modified or erased. Erasable Programmable ROM (EPROM) · It can be programmed multiple times unlike PROM. · The chip contents can be erased and re-written by exposing it to strong ultraviolet (UV) light. Electrically Erasable Programmable ROM (EEPROM) · It can be programmed multiple times like EPROM. · Unlike EPROM, the data can be erased and re-written electronically with no need of UV light. · Selective data can be erased from the EEPROM without erasing the whole chip. Test your knowledge: What type of ROM is a Flash Memory drive – MROM, PROM, EPROM, EEPROM?
8
10
New comment 5d ago
0 likes • 5d
Flash memory would be an EEPROM because electric voltage could be used to forcefully erase it's memory
Practice Question
Which of the following statements BEST describes least privilege principle in a cloud environment? - A. A single cloud administrator is configured to access core functions. - B. Internet traffic is inspected for all incoming and outgoing packets. - C. Routing configurations are regularly updated with the latest routes. - D. Network segments remain private if unneeded to access the internet.
3
5
New comment 4d ago
1 like • 5d
Answer is D. The keyword is "unneeded to access..."
Practice Question!
Jim's organization-wide implementation of IDaas offers broad support for cloud-based applications. Jim's company does not have internal identity management staff and does not use centralized identity services. Instead, they rely upon Active Directory for AAA services. Which of the following options should Jim recommend to best handle the company's onsite identity needs?
Poll
33 members have voted
2
4
New comment 3d ago
3 likes • 5d
SAML because it could be used to integrate already available Active Directory with the IDaaS without additional overhead
Passed CISSP on 11/09/24!
Hello Everyone, I passed the CISSP this past Saturday. Thank you all for your insights and coaching. Reach out to me if you want to talk, pscheuer66@outlook.com. Take care.
10
11
New comment 5d ago
0 likes • 9d
Congrats
Practice Question
Darrel believes that a database server in his environment was compromised using a SQL injection attack. Which one of the following actions would Darrel most likely take during the remediation phase of the attack? A. Rebuilding the database from backups B. Adding input validation to a web application C. Reviewing firewall logs D. Reviewing database logs
5
9
New comment 10d ago
1 like • 11d
B
1-10 of 13
@kazim-suleiman-8671
Better than yesterday

Active 4d ago
Joined Oct 2, 2024
powered by