Shon Gerber from CISSPCyberTraining.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge in cybersecurity from being a Red Team Squadron Commander; Chief Information Security Officer (CISO); and Adjunct Professor providing superior training from his years of experience in educating people in cybersecurity.
In this episode, Shon will covering questions from his CISSP Exam Questions at CISSPCyberTraining.com.
BTW - Get access to all my Training Courses here at: https://www.cisspcybertraining.com
Want to find Shon Gerber / CISSP Cyber Training elsewhere on the internet?
LinkedIn – www.linkedin.com/in/shongerber
CISSPCyberTraining.com - https://www.cisspcybertraining.com/
Facebook - https://www.facebook.com/CyberRiskReduced/
LINKS:
ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources
TRANSCRIPT:
…Okay this is Shon Gerber with CISSP cyber training.com and we are going to be going over some practice. C I S S P exam questions. And so you can find more of these
[email protected] and just head on over there you'll be able to find a bunch of those Also have some links in my show notes on where you can get some more questions, but one of the big factors around cybersecurity taking the CISSP exam is the questions that are associated with it So the ultimate goal is we're going to provide you some information. how you can best study and take the test for the CISSP exam? So question number one we're just going to kind of walk through some of these questions and then the follow on answers to them. So if a security mechanism offers confidentiality, then it also offers a high level of assurance that authorized subjects can blank the data. Objects and resources. So when it comes around this as we want to look at can it manage the data? Does it mitigate the data? Does it provide secrecy to the data? Or is there due diligence around the data? So the focus thing you want to look at is as it relates to the confidentiality of that environment, The confidentiality of it then it offers a high level of assurance Assurance is another key term to think about. And that would help you understand that maybe those words you can start mitigating or throwing out some words that maybe don't make a sense to that. Confidentiality Doesn't really typically deal with management. Now it might deal with mitigation but usually not. So if you're starting to deal with confidentiality so it's keeping something confident, confidential too. An organization or to a person. And then you have a high level of assurance which basically is you're assuring that it's going to be protected. Then you could throw out a couple of these questions right? But if you go and you focus on secrecy or due diligence, either one of those could possibly be it. But as you think hard about it, secrecy of the data is an important aspect around any aspect of confidentiality. And that only authorized people have access to the data. So that's an important part of this. And so as you're dealing with secrecy, the an authorization of it, confidentiality assurance and secrecy would be the key terms that I would focus on specifically enhance the answer to that question would be secrecy. Okay let's move on to the next question.