Пікірлер
@furkanozdemir1ify
@furkanozdemir1ify Күн бұрын
Best video I found on the web so far. Thanks
@LateInCyber0424
@LateInCyber0424 4 күн бұрын
great vids! hope we can get domain 3 - 5
@khanget
@khanget 5 күн бұрын
Some of the answers are not correct in this video can't agree to the given explanation to the answer.
@sumithooda121
@sumithooda121 18 күн бұрын
Question 44 and 45, answer should be A
@EngAyyad
@EngAyyad 23 күн бұрын
if i study on this video i will pass the exam?
@GamerzFaiths
@GamerzFaiths 10 күн бұрын
@@EngAyyad I use LinkedIn learning with Mike
@backuashan
@backuashan Ай бұрын
The speech synthesizer could be better, this one is distracting
@sukhisohal329
@sukhisohal329 2 ай бұрын
👌👌
@GamerzFaiths
@GamerzFaiths 2 ай бұрын
In the authentication portion of the video you have Something you are and something you have mixed up. You explain it right, but the slides are wrong.
@sukhisohal329
@sukhisohal329 3 ай бұрын
👌👌
@VishwanathBhandwale
@VishwanathBhandwale 3 ай бұрын
2 question answer should be C
@ENROUTERV3
@ENROUTERV3 3 ай бұрын
Siem peppering
@ENROUTERV3
@ENROUTERV3 3 ай бұрын
And a peppering in cyber security is a cryptographic tactic
@ENROUTERV3
@ENROUTERV3 3 ай бұрын
MD5 message digest algorithm version 5
@ENROUTERV3
@ENROUTERV3 3 ай бұрын
Code execution and spatial Theory
@ENROUTERV3
@ENROUTERV3 3 ай бұрын
Risk Theory of asset and key concepts how bad bear markets are. They are
@ENROUTERV3
@ENROUTERV3 3 ай бұрын
Asset security and domain 8 for hospitals and ODNI for TIPS which is a domain policy Transaction inflation protection service? Think so in asset. Anti fraud
@sauravjain1403
@sauravjain1403 3 ай бұрын
Great explanation
@abodymohumed8925
@abodymohumed8925 3 ай бұрын
Thanks so much but we need more and more questions
@InfoSecGuardians
@InfoSecGuardians 3 ай бұрын
Sure. We are working on it.
@painkillerO8
@painkillerO8 3 ай бұрын
do they have full CISSP training?
@wariyo2833
@wariyo2833 4 ай бұрын
Please correct question 21 Biba Model for Integrity should be "No write up, and no read down"
@wariyo2833
@wariyo2833 4 ай бұрын
Please make corrections to question 13. Bell-LaPadula (Confidentiality) should be "No read up, No write down" 👍🏾
@JaredEvans
@JaredEvans 4 ай бұрын
So many mistakes when highlighting the answer. This needs to be redone.
@JaredEvans
@JaredEvans 4 ай бұрын
For Question #5, CISSP preaches that the safety of humans is the #1 priority, no matter what. Why isn't B) Relocating the data center to fire-resistant building, not the best answer? This would warrant immediate action. Developing and testing a DRP would take a while, and humans would still be at risk due to the high possibility of a fire event.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Please Read Answer of Q17 -as - RSA
@hieuleblog
@hieuleblog 4 ай бұрын
great content, keep it up
@pgunwant
@pgunwant 4 ай бұрын
I find explanations not very correct here. Accepting the risk despite knowing critical vulnerability ? Forcing BYOD policy first and then providing separate devices to the executive. I really couldn’t understand it.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Thanks for your review. Let us understand the rationale. For the First comment:- Risk Acceptance is always decided by Business. While may rate the Issue / Vulnerability as Critical, Business nay still continue with the Risk to cease opportunity. Classic example is WFH during Pandemic. Security is a support function to Business and not a Business in itself. Second Comment:- Organizations today operate in a hybrid environment where Organizational Devices and BYOD go hand in hand. Enforcing the BYOD policy and providing a secure, approved device for the executive is the most appropriate action because it ensures security compliance, mitigates risks, maintains consistency in policy enforcement, and helps the executive understand the importance of security practices. In practice, Senior Executives are provided with secure devices (eg. Mobile, iPad etc) while they also use BYOD for ease of business.
@avalanche240
@avalanche240 4 ай бұрын
I low key disagree with the answer on question 2. The employees already were reporting suspicion of the emails.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
That's a fair point. Given that the employees are already reporting suspicious emails, the most immediate need might be to block known phishing emails using email content filtering (option A). However, conducting security awareness training (option C) remains crucial for improving the overall security posture and empowering employees to identify and respond to phishing attempts effectively in the long term. Hence a CISSP - Think Like a Manager - response would be Option C. Do Remember - The Biggest threat and Toughest Defense in any Organization are their employees.
@hufflepuffsunited7827
@hufflepuffsunited7827 2 ай бұрын
I would also add that option A would only be effective in blocking known phishing email addresses and not new ones that may pop-up. Option D in this case makes the most sense
@karthikeyanv3400
@karthikeyanv3400 4 ай бұрын
Nice one, good compilation and comparison
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Glad you enjoyed it
@karthikeyanv3400
@karthikeyanv3400 4 ай бұрын
I like this channel, but could be nice to reply for the comments posted by the viewers.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Sure
@karthikeyanv3400
@karthikeyanv3400 4 ай бұрын
Thank you for your effort. It is a different approach, than other CISSP channels. I appreciate the uniqueness. I could be nice the viewers take some time to give a like or leave comment to improve your effort. I have subscribed and liked it.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Thanks. Welcome aboard!
@Just_A_Tech.._
@Just_A_Tech.._ 4 ай бұрын
Great content,👍 keep it up. 💯👏
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Thank you 🙌
@rajnishjatan1014
@rajnishjatan1014 4 ай бұрын
Good stuff
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Glad you enjoyed
@Tradmos
@Tradmos 5 ай бұрын
deploying a firewall rule audit can reveal unauthorized traffic but does not identify potential vulnerabilities.
@Tradmos
@Tradmos 5 ай бұрын
Question 6. Establishing a recovery site is a long term recovery plan and may not be an immediate priority for restoration. A more correct answer should have been implementing an already existing recovery site. The choice of words can often mislead the student to pick the wrong answer.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Thanks for your review. The question talks about strategy and not solution. Secondly, " implementing an already existing recovery site" is not part of the available choices. Establishing a recovery site strategy (Option B) should be prioritized for the organization because it ensures business continuity by providing an alternate location for restoring critical systems and data in the event of a cyberattack. While other options such as implementing backup storage strategies, enhancing system resilience, and implementing fault tolerance measures are important, they may not directly address the need for a recovery site to quickly restore operations and minimize the impact of the cyberattack.
@Tradmos
@Tradmos 5 ай бұрын
Question 5 specifically asks which action should be taken FIRST when investigating activities in the SIEM logs and there was no mention of the company using firewalls. If you claim a security company implements a SIEM solution to monitor and manage security events, all eyes will go to the SIEM if there is a breach. Checking the firewall logs is a correct answer but the questions should be made very clear in this situation.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
You're absolutely right. The question should indeed provide clearer guidance on the specific actions to take when investigating suspicious activities in the SIEM logs. While analyzing firewall logs is a crucial step, the question could have been clearer to avoid any ambiguity. Thank you for highlighting this point.
@faboge
@faboge 4 ай бұрын
I agree! I got the question right but it maybe just by luck! My eyes went right to the SIEM first!
@Tradmos
@Tradmos 5 ай бұрын
Question 1. If the attackers are already exploiting the vulnerability, I think the organization would enter the incident response phase and no longer be in the Defense phase.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
While incident response and management (Option B) are critical components of a comprehensive security program, the primary focus of a secure email gateway in this scenario is on implementing a defense-in-depth strategy (Option C) to mitigate the risk of phishing attacks. A secure email gateway adds a layer of security to the organization's email system by inspecting incoming and outgoing emails for malicious content, filtering out phishing emails, and blocking suspicious attachments. This approach aligns with the defense-in-depth concept, which involves implementing multiple layers of security controls to protect against various types of threats. While incident response and management are essential for responding to security incidents, including phishing attacks, the implementation of a secure email gateway is a proactive measure to prevent such attacks from being successful in the first place, making defense in depth the more appropriate concept to address in this context.
@Tradmos
@Tradmos 5 ай бұрын
Question 4. You cannot provide a secure approved device for the executive, and enforce BYOD at the same time.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Organizations today operate in a hybrid environment where Organizational Devices and BYOD go hand in hand. Enforcing the BYOD policy and providing a secure, approved device for the executive is the most appropriate action because it ensures security compliance, mitigates risks, maintains consistency in policy enforcement, and helps the executive understand the importance of security practices. In practice, Senior Executives are provided with secure devices (eg. Mobile, iPad etc) while they also use BYOD for ease of business.
@Tradmos
@Tradmos 5 ай бұрын
This is a surprising answer... Accepting the risk is a big gamble when a critical vulnerability is already identified.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Considering the criticality of application for daily operation, Business may accept the Risk. While accepting the risk is not always the best long-term solution, in some cases, it may be a pragmatic approach to managing the immediate impact of a critical vulnerability until a permanent fix can be implemented. This approach may be accompanied by temporary measures to mitigate the risk and a plan to implement a permanent fix as soon as feasible.
@faboge
@faboge 5 ай бұрын
Why is question 1 not a compliance risk? I keep seeing PCI DSS
@InfoSecGuardians
@InfoSecGuardians 5 ай бұрын
In this scenario the organization may be in compliance with PCI DSS but that doesn't guarantee a protection against a breach. Whenever a business is performed, there are always certain risk involved which in this case was vulnerability in payment system. There is always a time lag between vulnerability identification to its remediation and during this time, the system will be at a risk.
@themy12
@themy12 5 ай бұрын
6 isn’t a good question. Wiping is considered clearing and there can be data remnants. Therefore the actual answer would be A.
@mdiman6615
@mdiman6615 5 ай бұрын
yes, i also agree, Option should be "A" more over question does not dictate to donate computer
@Flyounet
@Flyounet 5 ай бұрын
Agree too, wiping data in not enough to securely erase them. Or you must specify how data are erased depending of the support (HDD or SSD)
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Thanks for your review. This is a real world question and you may appreciate the common practice. Here's how Option B stands as a potential approach: Data Wipe: Performing a data wipe is a standard practice to remove all data from a storage device, including servers. While it's true that data remnants may remain after a standard wipe, using specialized wiping software that complies with recognized standards such as NIST SP 800-88 for data sanitation can significantly reduce the risk of data recovery. Secure Deletion of Operating System: Securely deleting the operating system ensures that no residual data is left on the server's storage devices. This step is crucial to prevent any potential data recovery efforts from accessing sensitive information. Donation to a Local School: Donating the server to a local school after performing the above steps can be a socially responsible and environmentally friendly way to dispose of the server. However, it's essential to ensure that the school understands the nature of the donation and agrees to handle the server appropriately. While physically destroying the server (Option A) is a more secure method, it may not be the most environmentally friendly option. In cases where environmental concerns are a priority, securely wiping the data and donating the server to a trusted organization can be a viable alternative.
@bryanotoole3038
@bryanotoole3038 4 ай бұрын
@@InfoSecGuardians Right. But the question doesn't mention the company is environmentally minded. The CISSP is about choosing the BEST option to solving the problem/in the best interest of the business. Proper physical destruction is the only sure way that there will be no way data can be recovered.
@abukanshunju5932
@abukanshunju5932 2 ай бұрын
I believe the correct answer is A. The question does not mention the company's environmental friendliness or any aspect of Corporate Social Responsibility.
@basemmahmoud9850
@basemmahmoud9850 6 ай бұрын
I liked question 6, it made me think. Well done, keep it up 👍
@danielumeh3610
@danielumeh3610 6 ай бұрын
Qts 2 .. I disagree with the answer. Let me support my case with this example. Imagine having a car that was recalled due to braking system. Would you accept the risk and keep driving the car? Please I'm here to learn, teach me more. Thank you!
@InfoSecGuardians
@InfoSecGuardians 6 ай бұрын
Thanks @danielumeh3610 for your review. Could you please imagine the same car carrying a critical patient to hospital ? Risk is always proportionate to the Reward. The question mentions "application is critical for daily operations". Always remember, as a CISSP you are only consulted (RACI matrix) but the actual decision will be with the Business. t.me/CisspInfosecGuardians
@tareknageeb5650
@tareknageeb5650 4 ай бұрын
I disagree too. I think the question lacks details to be sure about an accurate answer. Even in your answer you say the organisation "may" choose ... The answer depends on how "critical" the vulnerability is (software is internet reachable, easy to find/exploit vulnerability, ...etc), and what risks it presents (e.g. attacker might overtaken the whole internal network or just one server, reputation can be ruined, all customer data can be compromised, ..etc). For example, if the risk cost is higher than the "daily operations" disruption costs on the company, avoiding the risk (until the issue is mitigated) could be a better decision. Also "mitigating the risk" could be good, for example, if a FW or a WAF can help controlling some of the risk.
@tundeayeni4477
@tundeayeni4477 11 күн бұрын
you can also imagine arround a danger zone whereby you need to drive temporarily to save avoid the danger zone... this is what is meant by accepting the risk in the short term while working arround mitigation on the long term.
@user-ne5ok7se1o
@user-ne5ok7se1o 6 ай бұрын
Thank you for your good video learning of questions.
@rakhimishra8269
@rakhimishra8269 6 ай бұрын
SSL/TSL option C
@user-ne5ok7se1o
@user-ne5ok7se1o 6 ай бұрын
Thank you for this very good video learning from your channel. Mohammed from Yemen.
@InfoSecGuardians
@InfoSecGuardians 4 ай бұрын
Thanks, Mohammed! Best wishes to you and your family.
@trilokcsaini
@trilokcsaini 7 ай бұрын
Awesome… Eagerly waiting for more such informative videos
@yahumamahesh
@yahumamahesh 9 ай бұрын
Excellent
@LALASick
@LALASick 10 ай бұрын
Great content. Keep it coming
@sukhisohal329
@sukhisohal329 10 ай бұрын
🥇
@sukhisohal329
@sukhisohal329 10 ай бұрын
Fab