CISSP Practice question #129

Using type 3 authentication we talk about all of these terms except which?
A: FAR.
B: CER.
C: FRR.
D: CRR.

CBK 5: Identity and Access Management
Source: ThorTeaches.com practice tests

Answer


D: Something you are – Type 3 Authentication (Biometrics), uses Errors for Biometric Authentication: FRR (False rejection rate), FAR (False accept rate) and CER (Crossover Error Rate).

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #128

In our BCP which team is defined as responsible for the dealing with the disaster when it happens?
A: Rescue.
B: Recovery.
C: Salvage.
D: All of these.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


A: Rescue team (activation/notification): Responsible for dealing with the disaster as it happens. Evacuate employees, notifies the appropriate personnel (call trees) pull the network from the infected server or shut down systems, and initial damage assessment.

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #127

An attacker is using fragmentation to avoid our IPS, what is that?
A: Breaking the data into segments.
B: Sending traffic on a well-known TCP port, where we would not expect the malicious traffic.
C: Have many different agents use different IPs and ports.
D: Change the attack signature.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


A: Fragmentation: Sending fragmented packets, the attack can avoid the detection system’s ability to detect the attack signature.

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

IT Scholarships for Women | Center for Cyber Security and Education

IT Scholarships for Women | Center for Cyber Security and Education

(ISC)² WOMEN’S SCHOLARSHIPS NOW OPEN!

Applications will close at 11:59 PM on March 1, 2018

Award notifications will be made the week of April 16th 2018

Scholarships to inspire women to join the ever-growing field of Information Security   

The application period for the (ISC)² Women’s and Raytheon’s Women in Cybersecurity Scholarships is now open. Applications will be accepted for Undergraduate Scholarships beginning February 1, 2018, and Graduate Scholarships on March 1, 2018. For details on the Raytheon’s Women in Cyber Security Scholarship click here

BOTH CENTER WOMEN’S AND RAYTHEON SCHOLARSHIP APPLICANTS: CLICK HERE TO APPLY

You will need to submit an application for the Undergraduate or Graduate Scholarships in order to be considered for one of those awards, applications will NOT be automatically transferred. You will be able to import your Women’s/Raytheon application information and documents directly into the Undergraduate or Graduate application. Just click on the link for the appropriate scholarship and look for the import button on the top right of your dashboard.   Learn how to apply

Source: iamcybersafe.org/scholarships/womens-scholarships/

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

(ISC)² Cybersecurity Workforce Shortage Continues to Grow Worldwide, to 1.8 Million in Five Years

(ISC)² Cybersecurity Workforce Shortage Continues to Grow Worldwide, to 1.8 Million in Five Years

Attracting and Retaining Millennial Workers Vital to Closing the Gap

Clearwater FL, February 13, 2017 — According to new research from the Center for Cyber Safety and Education™ (the Center) — part of its eighth Global Information Security Workforce Study (GISWS) – sponsored by (ISC)²® and Booz Allen Hamilton, a serious talent shortage looms in the information security workforce. The survey and analysis, which includes feedback from over 19,000 information security professionals worldwide, indicates that employers must look to millennials to fill the projected 1.8 million information security workforce gap that is estimated to exist by 2022.  This is an increase of 20 percent from the 1.5 million worker shortfall forecast by the 2015 GISWS.

Source: www.isc2.org/News-and-Events/Press-Room/Posts/2017/02/13/Cybersecurity-Workforce-Shortage-Continues-to-Grow-Worldwide

The 2017 GISWS Millennial analysis can be viewed here: https://iamcybersafe.org/research_millennials/

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #126

Bob is working on categorizing incidences for our incident management plan what category does fires fall under?
A: Natural.
B: Environmental.
C: Human.
D: All of these.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


D: Fires can be natural, caused by our equipment or set by people.

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #125

What was the speed of T3?
A: 1,544Mbps.
B: 44,736Mbps.
C: 2,048Mbps.
D: 34,368Mbps.

CBK 4: Communication and Network Security
Source: ThorTeaches.com practice tests

Answer


D: E3 (Europe): 16 bundled E1 lines, creating a dedicated 34,368 Mbps circuit.

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #124

In the IAAA model which is not one of the A’s?
A: Authentication.
B: Alteration.
C: Authorization.
D: Accountability.

CBK 1: Security and Risk Management
Source: ThorTeaches.com practice tests

Answer


B: IAAA is Identification and Authentication, Authorization and Accountability. Alteration is the opposite of integrity from the CIA triad.

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #123

Which plan would we look at in our BCP for dealing with evacuating staff in an emergency?
A: COOP.
B: CCP.
C: OEP.
D: CIRP.

CBK 7: Security Operations
Source: ThorTeaches.com practice tests

Answer


C: OEP (Occupant Emergency Plan): How do we protect our facilities, our staff and the environment in a disaster event. This could be fires, hurricanes, floods, criminal attacks, terrorism, etc. Focuses on safety and evacuation, details how we evacuate, how often we do the drills and the training staff should get.

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading

CISSP Practice question #122

What is the most important to secure the safety of first in an emergency?
A: Staff.
B: Critical servers.
C: The building.
D: Backups.

CBK 3: Security Engineering
Source: ThorTeaches.com practice tests

Answer


A: Remember people are always more important to protect than stuff.

show less

IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.

Continue Reading