Artwork

Content provided by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

RCR 112: CISSP Exam Questions 001-003

8:28
 
Share
 

Manage episode 360067937 series 3464648
Content provided by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Shon Gerber from CISSPCyberTraining.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge in cybersecurity from being a Red Team Squadron Commander; Chief Information Security Officer (CISO); and Adjunct Professor providing superior training from his years of experience in educating people in cybersecurity.

In this episode, Shon will covering questions from his CISSP Exam Questions at CISSPCyberTraining.com.

BTW - Get access to all my Training Courses here at: https://www.cisspcybertraining.com

Want to find Shon Gerber / CISSP Cyber Training elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

CISSPCyberTraining.com - https://www.cisspcybertraining.com/

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS:

TRANSCRIPT:

…Okay this is Shon Gerber with CISSP cyber training.com and we are going to be going over some practice. C I S S P exam questions. And so you can find more of these questions@cisspcybertraining.com and just head on over there you'll be able to find a bunch of those Also have some links in my show notes on where you can get some more questions, but one of the big factors around cybersecurity taking the CISSP exam is the questions that are associated with it So the ultimate goal is we're going to provide you some information. how you can best study and take the test for the CISSP exam? So question number one we're just going to kind of walk through some of these questions and then the follow on answers to them. So if a security mechanism offers confidentiality, then it also offers a high level of assurance that authorized subjects can blank the data. Objects and resources. So when it comes around this as we want to look at can it manage the data? Does it mitigate the data? Does it provide secrecy to the data? Or is there due diligence around the data? So the focus thing you want to look at is as it relates to the confidentiality of that environment, The confidentiality of it then it offers a high level of assurance Assurance is another key term to think about. And that would help you understand that maybe those words you can start mitigating or throwing out some words that maybe don't make a sense to that. Confidentiality Doesn't really typically deal with management. Now it might deal with mitigation but usually not. So if you're starting to deal with confidentiality so it's keeping something confident, confidential too. An organization or to a person. And then you have a high level of assurance which basically is you're assuring that it's going to be protected. Then you could throw out a couple of these questions right? But if you go and you focus on secrecy or due diligence, either one of those could possibly be it. But as you think hard about it, secrecy of the data is an important aspect around any aspect of confidentiality. And that only authorized people have access to the data. So that's an important part of this. And so as you're dealing with secrecy, the an authorization of it, confidentiality assurance and secrecy would be the key terms that I would focus on specifically enhance the answer to that question would be secrecy. Okay let's move on

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

  continue reading

183 episodes

Artwork
iconShare
 
Manage episode 360067937 series 3464648
Content provided by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Shon Gerber from CISSPCyberTraining.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career. Shon utilizes his expansive knowledge in cybersecurity from being a Red Team Squadron Commander; Chief Information Security Officer (CISO); and Adjunct Professor providing superior training from his years of experience in educating people in cybersecurity.

In this episode, Shon will covering questions from his CISSP Exam Questions at CISSPCyberTraining.com.

BTW - Get access to all my Training Courses here at: https://www.cisspcybertraining.com

Want to find Shon Gerber / CISSP Cyber Training elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

CISSPCyberTraining.com - https://www.cisspcybertraining.com/

Facebook - https://www.facebook.com/CyberRiskReduced/

LINKS:

TRANSCRIPT:

…Okay this is Shon Gerber with CISSP cyber training.com and we are going to be going over some practice. C I S S P exam questions. And so you can find more of these questions@cisspcybertraining.com and just head on over there you'll be able to find a bunch of those Also have some links in my show notes on where you can get some more questions, but one of the big factors around cybersecurity taking the CISSP exam is the questions that are associated with it So the ultimate goal is we're going to provide you some information. how you can best study and take the test for the CISSP exam? So question number one we're just going to kind of walk through some of these questions and then the follow on answers to them. So if a security mechanism offers confidentiality, then it also offers a high level of assurance that authorized subjects can blank the data. Objects and resources. So when it comes around this as we want to look at can it manage the data? Does it mitigate the data? Does it provide secrecy to the data? Or is there due diligence around the data? So the focus thing you want to look at is as it relates to the confidentiality of that environment, The confidentiality of it then it offers a high level of assurance Assurance is another key term to think about. And that would help you understand that maybe those words you can start mitigating or throwing out some words that maybe don't make a sense to that. Confidentiality Doesn't really typically deal with management. Now it might deal with mitigation but usually not. So if you're starting to deal with confidentiality so it's keeping something confident, confidential too. An organization or to a person. And then you have a high level of assurance which basically is you're assuring that it's going to be protected. Then you could throw out a couple of these questions right? But if you go and you focus on secrecy or due diligence, either one of those could possibly be it. But as you think hard about it, secrecy of the data is an important aspect around any aspect of confidentiality. And that only authorized people have access to the data. So that's an important part of this. And so as you're dealing with secrecy, the an authorization of it, confidentiality assurance and secrecy would be the key terms that I would focus on specifically enhance the answer to that question would be secrecy. Okay let's move on

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

  continue reading

183 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide