CISSP Cyber Training Podcast - CISSP Training Program

CCT 015: CISSP Exam Questions (001-003)


Listen Later

Send us a text

Shon Gerber from CISSPCyberTraining.com provides you the information and knowledge you need to prepare and pass the CISSP Exam while providing the tools you need to enhance your cybersecurity career.  Shon utilizes his expansive knowledge in cybersecurity from being a Red Team Squadron Commander; Chief Information Security Officer (CISO); and Adjunct Professor providing superior training from his years of experience in educating people in cybersecurity. 

 

In this episode, Shon will covering questions from his CISSP Exam Questions at CISSPCyberTraining.com.

 

BTW - Get access to all my Training Courses here at:  https://www.cisspcybertraining.com

Want to find Shon Gerber / CISSP Cyber Training elsewhere on the internet?

LinkedIn – www.linkedin.com/in/shongerber

CISSPCyberTraining.com - https://www.cisspcybertraining.com/

Facebook - https://www.facebook.com/CyberRiskReduced/

 

LINKS: 

  • ISC2 Training Study Guide
    • https://www.isc2.org/Training/Self-Study-Resources

Transcript:

 

…Okay this is Shon Gerber with CISSP cyber training.com and we are going to be going over some practice. C I S S P exam questions. And so you can find more of these [email protected] and just head on over there you'll be able to find a bunch of those Also have some links in my show notes on where you can get some more questions, but one of the big factors around cybersecurity taking the CISSP exam is the questions that are associated with it So the ultimate goal is we're going to provide you some information. how you can best study and take the test for the CISSP exam? So question number one we're just going to kind of walk through some of these questions and then the follow on answers to them. So if a security mechanism offers confidentiality, then it also offers a high level of assurance that authorized subjects can blank the data. Objects and resources. So when it comes around this as we want to look at can it manage the data? Does it mitigate the data? Does it provide secrecy to the data? Or is there due diligence around the data? So the focus thing you want to look at is as it relates to the confidentiality of that environment, The confidentiality of it then it offers a high level of assurance Assurance is another key term to think about. And that would help you understand that maybe those words you can start mitigating or throwing out some words that maybe don't make a sense to that. Confidentiality Doesn't really typically deal with management. Now it might deal with mitigation but usually not. So if you're starting to deal with confidentiality so it's keeping something confident, confidential too. An organization or to a person. And then you have a high level of assurance which basically is you're assuring that it's going to be protected. Then you could throw out a couple of these questions right? But if you go and you focus on secrecy or due diligence, either one of those could possibly be it. But as you think hard about it, secrecy of the data is an

Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

...more
View all episodesView all episodes
Download on the App Store

CISSP Cyber Training Podcast - CISSP Training ProgramBy Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

  • 4.3
  • 4.3
  • 4.3
  • 4.3
  • 4.3

4.3

26 ratings


More shows like CISSP Cyber Training Podcast - CISSP Training Program

View all
Risky Business by Patrick Gray

Risky Business

360 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

627 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

367 Listeners

CISSP Training by CyberSecStudy

CISSP Training

16 Listeners

Hacked by Hacked

Hacked

179 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,006 Listeners

Smashing Security by Graham Cluley & Carole Theriault

Smashing Security

310 Listeners

Malicious Life by Malicious Life

Malicious Life

927 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,873 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

167 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

187 Listeners

Hacking Humans by N2K Networks

Hacking Humans

314 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

158 Listeners