CISSP Practice question #8

Jane is tasked with looking at FIDM, which of these would she not consider.
A: Security tokens.
B: Microsoft Azure cloud.
C: RFID.
D: Windows identity foundation.

CBK 5: Identity and Access Management
Source: ThorTeaches.com practice tests

Answer


C: RFID (Radio Frequency Identification) is used a variety of things including smart cards and not FIDM (Federated Identity Management).

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Certification: Competition time – Win a CISSP practice test! October 8th 2017

Competition time!

Enter to win a free CISSP Practice exam.

Rules:

To enter you must do these 2 to be eligible (+3 entries)

  1. Join the CISSP study group at https://www.facebook.com/groups/ThorTeaches/
  2. Like and comment on the competition post in the Facebook group.

Optional:

  1. Share this post on Facebook (+5 entries).

The Winner will be drawn at random after the competition is over and announced in the Facebook group!
If you already own all 4 practice tests, we can do an amazon gift card instead, but only available to people with all 4 tests ($10 value).
The competition ends October 14th at 12:00 HST (noon).

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

New (ISC)² Community site is up!

Join the new (ISC)² Community today and earn your Early Adopter badge

(ISC)² is excited to announce the launch of its new online Community!

Created for cybersecurity and IT professionals, the (ISC)² Community allows you to connect, collaborate and share your

knowledge and experience with other pros – (ISC)² members and non-members alike!

(ISC)² Community

Source: community.isc2.org/

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

IT Security: From Internet Society “Five Steps You Can Take Right Now to Increase Your Privacy”

Five Steps You Can Take Right Now to Increase Your Privacy | Internet Society

You should care about your privacy online even if you think you have nothing to hide. A key aspect of privacy is being able to choose what information you share publicly and what is private. Would you want your bank account balance displayed for anyone to see? What about your medical history? Encryption is a …

Source: www.internetsociety.org/blog/2017/09/five-steps-can-take-right-now-increase-privacy/

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

IT Security – from CSO online: “Future cyber security threats and challenges: Are you ready for what’s coming?”

Future cyber security threats and challenges: Are you ready for what’s coming?

Among the the alarming trends highlighted in a new study from The Internet Society (ISOC) are the rise of state-sponsored cyber attacks as the internet is becoming increasingly intertwined with national security and the creation of “security divides” where some entities won’t be capable of dealing properly with threats.

Source: www.csoonline.com/article/3226392/security/future-cyber-security-threats-and-challenges-are-you-ready-for-whats-coming.html

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #7

A fire can be which type of a disaster?
A: Environmental.
B: Human.
C: Natural.
D: All of these.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


D: Fires can be caused by nature, our environment and people.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

IT Security – from Internet Society “Evidence at the cost of trust: The trouble with the Department of Justice – DreamHost case”

Evidence at the cost of trust: The trouble with the Department of Justice – DreamHost case | Internet Society

The social and economic benefits of the Internet cannot be realized without users’ ability to communicate and organize privately, and, where appropriate, anonymously. Data collection warrants must strike a balance to protect these benefits without impeding law enforcement’s ability to enforce the law. In recent weeks, the United States Department of Justice’s (DoJ) conflict with DreamHost, …

Source: www.internetsociety.org/blog/2017/08/evidence-cost-trust-trouble-department-justice-dreamhost-case/

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #6

Why would we use a RTM in software testing?
A: To ensure we are secure.
B: To test for malformed input.
C: To map requirements to the testing plan.
D: To test the code while executing it.

CBK 6: Security Assessment and Testing
Source: ThorTeaches.com practice tests

Answer


C: TM/RTM (Requirements Traceability Matrix): Normally a table, used to map customer requirements to the testing plan using a many-to-many relationship comparison. A requirements traceability matrix may be used to check if the current project requirements are being met, and to help in the creation of a request for proposal, software requirements specification, various deliverable documents, and project plan tasks.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

IT Security – from Internet Society “Five Steps You Can Take Right Now to Increase Your Privacy”

Five Steps You Can Take Right Now to Increase Your Privacy | Internet Society

You should care about your privacy online even if you think you have nothing to hide. A key aspect of privacy is being able to choose what information you share publicly and what is private. Would you want your bank account balance displayed for anyone to see? What about your medical history? Encryption is a …

Source: www.internetsociety.org/blog/2017/09/five-steps-can-take-right-now-increase-privacy/

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #5

Who would perform a structured audit?
A: Senior management.
B: IT security staff.
C: External auditors.
D: Internal auditors.

CBK 6: Security Assessment and Testing
Source: ThorTeaches.com practice tests

Answer


C: Structured audits (3rd party): External auditors there to validate compliance, they are experts and the audit adds credibility. Can also be a knowledge transfer for the organization, required annually in many organizations.

show less

IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading