RCR 112: CISSP Exam Questions 001-003
Listen now
Description
Shon Gerber from CISSPCyberTraining.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge in cybersecurity from being a Red Team Squadron Commander; Chief Information Security Officer (CISO); and Adjunct Professor providing superior training from his years of experience in educating people in cybersecurity.  In this episode, Shon will covering questions from his CISSP Exam Questions at CISSPCyberTraining.com. BTW - Get access to all my Training Courses here at:  https://www.cisspcybertraining.com Want to find Shon Gerber / CISSP Cyber Training elsewhere on the internet? LinkedIn – www.linkedin.com/in/shongerber CISSPCyberTraining.com - https://www.cisspcybertraining.com/ Facebook - https://www.facebook.com/CyberRiskReduced/ LINKS:  ISC2 Training Study Guide https://www.isc2.org/Training/Self-Study-Resources   TRANSCRIPT: …Okay this is Shon Gerber with CISSP cyber training.com and we are going to be going over some practice. C I S S P exam questions. And so you can find more of these [email protected] and just head on over there you'll be able to find a bunch of those Also have some links in my show notes on where you can get some more questions, but one of the big factors around cybersecurity taking the CISSP exam is the questions that are associated with it So the ultimate goal is we're going to provide you some information. how you can best study and take the test for the CISSP exam? So question number one we're just going to kind of walk through some of these questions and then the follow on answers to them. So if a security mechanism offers confidentiality, then it also offers a high level of assurance that authorized subjects can blank the data. Objects and resources. So when it comes around this as we want to look at can it manage the data? Does it mitigate the data? Does it provide secrecy to the data? Or is there due diligence around the data? So the focus thing you want to look at is as it relates to the confidentiality of that environment, The confidentiality of it then it offers a high level of assurance Assurance is another key term to think about. And that would help you understand that maybe those words you can start mitigating or throwing out some words that maybe don't make a sense to that. Confidentiality Doesn't really typically deal with management. Now it might deal with mitigation but usually not. So if you're starting to deal with confidentiality so it's keeping something confident, confidential too. An organization or to a person. And then you have a high level of assurance which basically is you're assuring that it's going to be protected. Then you could throw out a couple of these questions right? But if you go and you focus on secrecy or due diligence, either one of those could possibly be it. But as you think hard about it, secrecy of the data is an important aspect around any aspect of confidentiality. And that only authorized people have access to the data. So that's an important part of this. And so as you're dealing with secrecy, the an authorization of it, confidentiality assurance and secrecy would be the key terms that I would focus on specifically enhance the answer to that question would be secrecy. Okay let's move on to the next question.
More Episodes
Ever get tangled up in the complexities of identity and access management? Tired of letting confusion rob you of effective cybersecurity strategies? Well, it's time to tune in and simplify it all! As your resident cybersecurity expert, Sean Gerber, I'll be taking the reins in this exciting...
Published 10/16/23
Ever wondered how to ace the CISSP Cyber exam's domain four? Or, perhaps, you're merely intrigued by the intricate world of Voiceover IP (VOIP)? Either way, this episode is packed with the insights you've been seeking! Join me, Sean Gerber, as we dissect the key protocols that VOIP uses for...
Published 10/12/23