Category : CISSP

My switch lost console access.  No VLAN IP had been configured, so I could not access it.  I used the following article to regain access via telnet/ssh. Source: https://community.cisco.com/t5/switching/catalyst-2950-reset-to-factory-settings-problem/td-p/1507476 I have simulated your issue on my local Cat2950 and succeeded with both expess setup of “virgin” switch and reseting the configured switch again for express ..

Read more

https://quizlet.com/167611061/cissp-practice-questions-flash-cards/ 25 What logical operation is described by the truth table shown here? Input 1 Input 2 Output 0 0 0 0 1 1 1 0 1 1 1 0   A. OR B. AND C. XOR D. NOR 26. How many bits of keying material does the Data Encryption Standard (DES) use for encrypting ..

Read more

< Domain 2 – Asset Security | Overview Security Architecture and Design Common security models Architecture, design, virtualization, cloud and solutions How computers work and how the are logical segmented Threads to our applications, systems and devices Cryptography History of Types of encryption Hashes Cryptography attacks Digital signatures Physical Security Site and facility secure design ..

Read more

< Domain 1 – Security and Risk Management | Domain 3 – Security architecture & Engineering > Overview Domain 2 study guide   S23 – Data classification and clearance Data Classification Policies Labels: Objects have labels assigned to them The label is used to allow Subjects with the right clearance to access them Labels are ..

Read more

Anagrams, Mnemonic, Data Dumps, etc.   Data Dump Data Dump Encryption DEER MRS H CARBIDS Asymmetric: encrypt with 1 key, decrypt with other Key exchange, Confidentiality, Nonrepudiation, Integrity D – Diffie-Hellman E – El Gamal: DH +nonrepudiation E – ECC R – RSA Hash- one-way algorithm, no key M – MD5 R – RIPEMD (160) ..

Read more

Domain 2 – Asset Security > ALWAYS REMEMBER THIS – To Pass This Test, Think As An IT Manager or Risk Assessment Consultant! CBK – Common Body of Knowledge S9 – The CIA Triad The CIA Triad (aka AIC) Confidentiality Integrity Availability Uses IPS/IDS Patching Redundancy (HA / no single point of failure) SLAs Threats ..

Read more

Section 9 – The CIA Triad The CIA Triad (aka AIC) Confidentiality Keep our secret secret and only allow access to those who need it. Integrity How do you know someone didn’t alter your data? Availability Ensure the data is available to people that need it when they need it Confidentiality Data at rest (storage) ..

Read more