Trending CISSP Discussions

Follow

Ask the Community


Ask any professional question and get answers from other specialists.

Stream language
Muhannad Kilani's image
Question added by Muhannad Kilani Technical Account Manager Panorama IT
10 years ago

CISSP from (ISC)² Do you Recommend , and why ?‎

CISSP from (ISC)² Do you Recommend , and why ?‎

Answers:
2
Followers:
Views:
315
Vote Count:
7
Answer should contain a minimum of 25 characters.
Syed Javed's image
Question added by Syed Javed it consultant Infosys
7 years ago

What is difference between DOS and DoS or DDoS?‎

Difference is IT security related.‎

Answers:
33
Followers:
Views:
850
Vote Count:
1
Answer should contain a minimum of 25 characters.
Abdulla Alrashdi's image
Question added by Abdulla Alrashdi Network Security Engineer C4 Advanced Solution
7 years ago

What is RSA encryption? and how secure is it? what is it's main disadvantage(s)? and which encryption function could replace? :)‎

By conducting security awareness sessions, send awareness e-mails, field assessments, and enforce higher security measurements through systems configuration to reduce hum‎ ... See More

Answers:
2
Followers:
Views:
220
Vote Count:
0
Answer should contain a minimum of 25 characters.
Shoaib khan's image
Question added by Shoaib khan Sr security risk analyst Snowflake
7 years ago

What is Mandatory Access Control (MAC) and Discretionary Access control (DAC). What is the major difference. ?‎

honey pots are the technology used by the company information security team to check the hacker activity when they wants to penetrate in your network infrastructure.Honey‎ ... See More

Answers:
3
Followers:
Views:
1702
Vote Count:
0
Answer should contain a minimum of 25 characters.
Rajeesh Mavilakkandy's image
Question added by Rajeesh Mavilakkandy SYSTEM ENGINEER MOHD. BINGHALAITA GROUP (MINDSOFT GLOBAL TECHNOLOGIES)
8 years ago
Answers:
11
Followers:
Views:
322
Vote Count:
0
Answer should contain a minimum of 25 characters.
Sarfaraz Chougule's image
Question added by Sarfaraz Chougule Consultant and Trainer Consultant
9 years ago

In which software development life cycle phase do the programmers and developers become deeply involved and do the majority of the work?‎

Choose the best option. A. System Design Specifications B. Software Development C. Operation and Maintenance D. Functional Design Analysis and Planning‎

Answers:
1
Followers:
Views:
443
Vote Count:
1
Answer should contain a minimum of 25 characters.
Default profile image
Question added by Navas Chenganath IT Manager Dubai Aviation Engineering Projects (DAEP), PINNACLE INFOTECH
10 years ago

What is the demand for CISSP in Middle East Job Market?‎

What is the demand for CISSP in Middle East Job Market‎

Answers:
8
Followers:
Views:
1013
Vote Count:
1
Answer should contain a minimum of 25 characters.
Muhammad Kashif Khan's image
Question added by Muhammad Kashif Khan System Engineer Xper2go Inc.
10 years ago
Answers:
1
Followers:
Views:
880
Vote Count:
0
Answer should contain a minimum of 25 characters.