Activity
Mon
Wed
Fri
Sun
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Owned by Vincent

CISSP Study Group

Public • 956 • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

CISSP Study Group+

Private • 20 • $40/m

Achieve higher earnings and better jobs in IT/cyber faster! We provide the tools and community you need to make smart career decisions.

Memberships

Skool Community

Public • 182.3k • Paid

The Skool Games

Private • 22.7k • Free

Rebels 🤘😎

Private • 57 • $1/m

Gif

Private • 223 • $1/m

Skool Wellness Gym 💚

Private • 35 • $5/m

Chaos

Private • 30 • $1/m

Lead Magnet Studio

Public • 47 • Free

Tech Mentors Academy

Private • 27 • Free

370 contributions to CISSP Study Group
Practice Question!
You want to distribute a large file and prefers a peer-to-peer CDN. Which of the following is the most common example of this type of technology?
Poll
15 members have voted
2
5
New comment 2h ago
2 likes • 2h
Answer is BitTorrent, like @Dave W pointed out its the most common example of a p2p content delivery network (CDN)
TRUE statements about CISSP topics.
Sometimes its helpful to just know the answer ... I've spent a long time committing the wrong things to memory by guessing, and thats never been more apparent than while studying for the CISSP. It can be helpful to just read a TRUE statement, and say "okay 🤷‍♂️"... IPsec, or Internet Protocol Security, can provide encryption, access control, nonrepudiation, and message authentication using public key cryptography. In an infrastructure as a service (IaaS) environment, the company that provides cloud environment has final control of all the virtual machines and networks. Thus, to protect data, the best option is to encrypt the data. NetFlow records contain an entry for every network communication session that took place on a network and can be compared to a list of known malicious hosts. The most common cause of a false positive for a water-based system is human error. If you turn off the water source after a fire and forget to turn it back on, you'll be in trouble for the future. Data retention policies can reduce the amount of old logs and other files that may need to be produced during a legal case. Duress systems are intended to allow employees to notify security or others when they are in a dangerous situation or when they need help. The CIS benchmarks provide a useful security standard and baseline to assess systems against or to configure them to.
2
0
Additional Daily Pow-wows - Who's Game?
@Annette Corona , @Claudie Aldridge , @Kellee Wamble and others. What: As discussed earlier today, I am looking for participants interested in meeting daily for more study sessions. Why: I am a kinesthetic learner - my study time is more effective if I am actively involved. As such, I gain more from hearing others add their experiences or understanding to what I am reading or learning, brainstorming/talking through what isn't quite clear, etc. So if you have the time and are willing, please please please indicate your interest.
2
21
New comment 4h ago
0 likes • 7h
@Rebecca Kirk That's fine I can adjust them
0 likes • 6h
Happy to do it, hope this helps anyone out. I will be consistently rejoining our sessions as time permits, looking forward to getting back to studying with you all - but in the meantime I am working on gathering reviews for the community. If anybody would be willing, you can find our page here - https://www.trustpilot.com/review/cisspstudygroup.com
Practice Question!
You are reviewing the availability controls for the system architecture shown in the picture. What technology is shown that provides fault tolerance for the database servers?
Poll
26 members have voted
6
2
New comment 1d ago
Practice Question!
3 likes • 2d
[attachment]
1-10 of 370
Vincent Primiani
6
714points to level up
@vincent-primiani-8103
Cybersecurity. The Study Group Guy.

Active 1h ago
Joined Apr 29, 2024
Tampa, FL
powered by