Question: An IS auditor should know information about different network transmission media. Which of the following transmission media is used for short distance transmission?
Comment:
Hello, Nothing in the question can make us differentiate between the Radio frequency and the cobber cable !!! at all. How we can deiced if both of them used for short distance ????
-----------------------------
--
===========================================================
Another resource brought to you by CCCure for our Learners
Having any issues, contact us at: sup...@cccure.com
Visit our quiz at: https://www.freepracticetests.org
Visit our learning portal at: https://cccure.training
Visit the CCCure Web Store at: https://www.cccure.com
===========================================================
---
You received this message because you are subscribed to the Google Groups "CISSP Study Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cissptalks+unsubscribe@googlegroups.com.
To post to this group, send email to cissp...@googlegroups.com.
Visit this group at https://groups.google.com/group/cissptalks.
To view this discussion on the web visit https://groups.google.com/d/msgid/cissptalks/CAA3tmKsJ58f%3DXrPsWdwYXT%2BFJT9RQRHYy4sLY4rrfUYK0SH0gA%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
---------------------------------------------------------------------------------------------
Clement Dupuis, CD
CCCure Owner and Founder
Chief Learning Officer (CLO) and Security Evangelist
The CCCure Family of Portals
GCFW, GCIA, Security+ 301, CEH V7, CCSA, CCSE, + 12 others
For support or queries send an email to: Sup...@CCCure.Com
----------------------------------------------------------------------------------------------
To view this discussion on the web visit https://groups.google.com/d/msgid/cissptalks/CABGste4cwmFo7qdj%2Bj%3DTor71ZoCkMpSWm-A2o9thSxQMwD3a3w%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cissptalks/CALR7dM3HJZ1ow%3DxhkRvfM15a9OjJYWY5kwGYi-Rmc9VYr0fsfA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/cissptalks/CAFjgqnqX8wGGm7Mr6s7JE6X-MnX%2B%2BbjOrxr13MoLTriP-JD%2Bgw%40mail.gmail.com.
Quiz Question number: 1883
Question: Steven, who is one of the experts on your security testing team has been tasked to validate physical security of CCCure. Steven did some research on the target company and decided that the best way to compromise physical security would be to gain entry to the building by following someone who has legitimate access (using their credential) and then gain access to the target area. What would you call such an attack?
Comment:
Tailgating is obviously the only option that makes any sense here, but nowhere in any of the study guides or CISSP CBK documentation have I ever seen it referred to as "tailgating". It's ONLY ever referred to as "piggybacking". See (ISC)2 Official Study Guide Seventh Edition (Stewart, Chapple, Gibson) page 398; Chapter 10: Physical Security Requirements - Access Abuses. So riddle me this Batman, if "piggybacking" and "tailgating" were BOTH listed as options here, which one would be the *most* correct in THAT case?
Our mailing list name is: CISSPtalks
To SUBSCRIBE to our Mailing List you can send an email to: cissptalks...@googlegroups.com
You can visit the group online at: http://groups.google.com/group/cissptalks.
Members can post messages to the list using the email address: cissp...@googlegroups.com
From: Roshad
Question number: 1100
Question: When attempting to establish Liability, which of the following would be described as performing the ongoing maintenance necessary to keep something in proper working order, updated, effective, or to abide by what is commonly expected in a situation?
Comment:
Darril Gibson has this information listed the exact opposite way. How does one determine which is correct? "Due care is using reasonable care to protect the interests of an organization. Due diligence is practicing the activities that maintain the due care effort. For example, due care is developing a formalized security structure containing a security policy, standards, baselines, guidelines, and procedures. Due diligence is the continued application of this security structure onto the IT infrastructure of an organization. Operational security is the ongoing maintenance of continued due care and due diligence by all responsible parties within an organization." In the above example, due care is implementing the control while diligence is maintaining due care.
SEE BELOW THE COMMENT I HAVE RECEIVED FROM ABDULLA:
From: abdulla
Question number: 1433
Question: Why should batch files and scripts be stored in a protected area?
Comment:
Hello, If we consider the perspective of security in this question and best practice. As best practice we can't hard code the credentials in the code. So, the choice of having credential in the code should be skipped. Other choices make more sense. so it should be protracted because it can't be accessed by users is make more sense This is my opinion and how i read the question.
Please see below instructions on how to join and participate in our CISSP Study Mailing List.
"When you have two words that are synonymous, they will never be presented at the same time within the same question". Really? Then explain this:
Additionally, in your question - "following someone who has legitimate access (using their credential)" - the highlighted portion is specifically defined as masquerading NOT piggybacking/tailgating. The distinction being that masquerading involves the use of valid credentials where piggybacking is just following someone through WITHOUT being authenticated themselves.I'd also like to add that while, yes there are many references in the CIB, if the "official" study guide, which is explicitly endorsed by the CEO of (ISC)2 and published by an (ISC)2 partnered organization, cannot be relied upon as an authoritative reference for specific terminology that is not open to interpretation or substitution (as is indicated by the question pictured above) then what good is it?After several months of studying numerous resources, I have encountered a ton question/answer combinations that are absolutely infuriating. I'm taking the exam tomorrow so we'll see how I do, but to tell you the truth, this whole process has seriously diminished my respect for the CISSP credential. In my opinion it's nothing more than another "test on how to take a test" and not a test of actual security knowledge, which is reinforced by the fact that I've met (and worked with) several CISSP certified individuals who can barely spell "ACL" let alone define what it is! I'm not saying anyone with a CISSP isn't really a security professional, I'm just saying you clearly don't need to be one to get the cert... but what do I know </rant>Best Regards,Brian
--
===========================================================
Another resource brought to you by CCCure for our Learners
Having any issues, contact us at: sup...@cccure.com
Visit our quiz at: https://www.freepracticetests.org
Visit our learning portal at: https://cccure.training
Visit the CCCure Web Store at: https://www.cccure.com
===========================================================
---
You received this message because you are subscribed to the Google Groups "CISSP Study Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cissptalks+unsubscribe@googlegroups.com.
To post to this group, send email to cissp...@googlegroups.com.
Visit this group at https://groups.google.com/group/cissptalks.
To view this discussion on the web visit https://groups.google.com/d/msgid/cissptalks/4e31f090-8895-487c-992e-6966c523b39f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.