Activity
Mon
Wed
Fri
Sun
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

Public • 957 • Free

7 contributions to CISSP Study Group
Practice Question!
You want to distribute a large file and prefers a peer-to-peer CDN. Which of the following is the most common example of this type of technology?
Poll
17 members have voted
2
5
New comment 8h ago
0 likes • 8h
Cloudflare, Akamai and Amazon CloudFront are HTTP based CDNs.
0 likes • 8h
Answer should be WebTorrent?
Practice Question
Based on recent articles about the risk of mobile code and web apps, you want to adjust the security configurations of organizational endpoint devices to minimize the exposure. On a modern Windows system with the latest version of Microsoft's browser and all others disabled or blocked, which of the following is of the highest concern? A. Java B. Flash C. JavaScript D. ActiveX
1
3
New comment 4h ago
1 like • 2d
C
Practice Question!
You are reviewing the availability controls for the system architecture shown in the picture. What technology is shown that provides fault tolerance for the database servers?
Poll
27 members have voted
6
2
New comment 2d ago
Practice Question!
1 like • 2d
Fault tolerance focuses on preventing system failures, while disaster recovery focuses on restoring operations after a failure has occurred.
Discussion Topic - The Role of AI in Modern Cybersecurity: Friend or Foe?
In light of NIST’s recent announcement about their new program aimed at managing cybersecurity and privacy risks associated with AI, let's discuss how the integration of AI is changing the landscape of cybersecurity and privacy management. This program introduces standards, guidelines, and tools to address risks like data leakage from model training, AI-enabled cyber threats, and the need for explainable, interpretable solutions.
7
6
New comment 4d ago
0 likes • 4d
AI, still in its incubation phase, is playing the roles of both Friend and Foe. Here are a few examples: AI is pivotal in transforming infrastructure monitoring using analytics and machine learning to pinpoint the root cause and automate incident resolutions. Physical Security has evolved leaps and bounds with the introduction of AI-controlled cameras, drastically reducing false alarms. Advanced AI capabilities have allowed patches/upgrades to be thoroughly tested before deploying to the production environment, thus enhancing system reliability. For the GRC world, AI helps sift complex data sets, identifying critical compliance issues before they escalate. Regarding the role of a Foe, AI is still evolving and has a long way to go before eliminating bias. We still have to address significant challenges around data privacy issues and ethical concerns. One primary concern could be the sustainability and environmental impact of the increased usage of AI, leading to uncontrolled use of technology.
0 likes • 4d
@Chris Edell Classic case of AI vs AI. We understand sophisticated Hackers have unlimited access to funds and they are more nimble than state agencies.
Practice Question
What form of encryption can provide secure communications between two parties when they have no prior method of communicating securely? A. Symmetric B. Block Cypher C. Asymmetric D. AES
2
4
New comment 5d ago
1 like • 6d
C
1-7 of 7
Rajdeep Ajmani
2
15points to level up
@rajdeep-ajmani-8331
Infrastructure and Security Managed Services Professional.

Active 4h ago
Joined Sep 26, 2024
powered by