A flock of eagles landed!

Featured

20200626-Get Your Copy Right Now

A flock of eagles landed!

I received 50 author copies today.  Amazon KDP doesn’t disappoint me. Even though my author copies take 6 weeks to arrive in my office, the quality of the final work is exactly what I want as that I printed in Taiwan.


一群老鷹總算來了!

當初為了趕出版時間, 我選擇在台灣打樣. 而沒有跟美國Amazon KDP確認最終樣本就直接上架了(Amazon還要印樣書, 由美國寄到台灣作確認實在太久了). 還好Amazon沒讓我失望, 他們的印刷品質跟我在台灣印刷幾乎相同, 實在很棒!

今天總算收到從Amazon寄出的作者專書, 前後雖然花了6週才由美國送到我的辦公室, 但看到最終的品質, 也算是彌補了一點缺憾!

每本書都像一隻老鷹, 以銳利的眼光在高空緃觀全局以尋找獵物(CISSP)! 希望這本書能像老鷹一樣, 協助正在準備CISSP考試的朋友順利擒獲CISSP這隻獵物!

購買連結

  1. Amazon購買連接: https://www.amazon.com/dp/B087JL6BXR
  2. 直接向Wentz購買這本書: https://wentzwu.com/buy

CISSP PRACTICE QUESTIONS – 20200704

Effective CISSP Questions

A bank is evaluating two models of one-time password tokens for multi-factor authentication. Both models have a button, an LCD, volatile memory, and a battery, but no keypad. Model A uses a non-replaceable battery, while the battery of Model B must be replaced in three minutes if the low battery. Which of the following token types is most likely implemented by Model B?
A. Static password token
B. Synchronous dynamic password token
C. Asynchronous password token
D. Challenge-response token

Continue reading

CISSP PRACTICE QUESTIONS – 20200703

Effective CISSP Questions

A bank is evaluating two models of one-time password tokens for multi-factor authentication. Both models have a button, an LCD, volatile memory, and a battery, but no keypad. Model A uses a non-replaceable battery, while the battery of Model B must be replaced in three minutes if the low battery. Which of the following token types is most likely implemented by Model A?
A. Static password token
B. Synchronous dynamic password token
C. Asynchronous password token
D. Challenge-response token

Continue reading

A Book that Saves Your Time and Money!

20200626-Get Your Copy Right Now

If you come from the technical battlefield and on your journey to CISSP, you should start with my book, The Effective CISSP: Security and Risk Management.

It is an unconventional tutorial and reference to:

  1. Core concepts of information security management
  2. Business continuity
  3. Risk management.

If you are confused or get lost in studying CISSP, buy my book right now to boost your study to save your time and money!

Wentz’s PICS for CISSP

Buy my book right now to receive Wentz’s free PICS session to guide you through critical concepts in person for 80 minutes.

 

Security Modes in CISSP D3

Security Modes

 


A BLUEPRINT FOR YOUR SUCCESS IN CISSP

My new book, The Effective CISSP: Security and Risk Management, helps CISSP aspirants build a solid conceptual security model. It is not only a tutorial for information security but also a study guide for the CISSP exam and informative reference for security professionals.

CISSP PRACTICE QUESTIONS – 20200702

Effective CISSP Questions

TEMPEST (Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions) is about spying on information systems through leaking electromagnetic emanations, sounds, and mechanical vibrations and how to shield equipment against such spying. Which of the following is the most effective countermeasure against the concern of TEMPEST?
A. Captive portal
B. Awareness training
C. Air-gapped network
D. Wire-meshed space

Wentz’s Book, The Effective CISSP: Security and Risk Management https://www.amazon.com/dp/B087JL6BXR

Continue reading

CISSP PRACTICE QUESTIONS – 20200630

Effective CISSP Questions

Your company decides to subscribe to SaaS from a well-known cloud service provider. As a security professional, you are tasked to prepare for a security plan. Which of the following should you do first?
A. Determine data types processed by the SaaS cloud services.
B. Categorize the system based on its impact level
C. Scope and tailor security controls
D. Identify stakeholders

Wentz’s Book, The Effective CISSP: Security and Risk Management https://www.amazon.com/dp/B087JL6BXR

Continue reading

CISSP PRACTICE QUESTIONS – 20200629

Effective CISSP Questions

As the newly hired CISO for a global company selling toys all over the world, you are reviewing the company’s mission statement and organizational structure and processes, identifying applicable legal and regulatory requirements, and interviewing stakeholders to implement the business continuity management system (BCMS). Which of the following is the most likely activity you will do next?
A. Conduct business impact analysis
B. Determine the scope
C. Assess risk
D. Develop the business continuity plan

Wentz’s Book, The Effective CISSP: Security and Risk Management https://www.amazon.com/dp/B087JL6BXR

Continue reading

CISSP PRACTICE QUESTIONS – 20200628

Effective CISSP Questions

You are planning the program for security awareness, training, and education. Which of the following is not the primary target audience who needs more knowledge and skills that will enable them to perform their jobs more effectively?
A. All employees
B. End-users
C. Security administrators
D. IT engineers

Wentz’s Book, The Effective CISSP: Security and Risk Management https://www.amazon.com/dp/B087JL6BXR

Continue reading