~ 蔡明軒 (Albert Tsai), 暫時通過CISSP考試, CCNA
This is a video from YouTube for collection.
I, Wentz Wu, am not affiliated, associated, or in any way connected with the fake Facebook account, its page, or any of its affiliates.
How disgraceful this fake Facebook account illegally used my photo, infringed copyright, and conducted illegal activities. I’ve reported this fake account, and Facebook has removed it.
~ Erwin, 暫通通過 CISSP考試, MCTS .NET, OCPJP
I just received the “Notice of Infringement” from ISC2, as the screenshot shows.
As you may know, I’ve been quite actively contributing to the community, helping others, and strictly following the rules and compliance requirements.
I’ve also spent much time “100% originally writing” CISSP practice questions and explaining my suggested answers to help CISSP aspirants and contribute to the community, as most instructors have done. However, ISC2 officially expresses its concern and claims its copyright.
I am communicating with ISC2. If they insist that I shall follow its request to remove my QOTDs immediately and stop writing practice questions. I will do so per the request. If QOTDs are removed in the end, I hope discussions will continue!
Thank you for your active engagement!
Evidence of My Original Work
- To Think Strategically and Critically (Posted on March 24, 2021)
- Wentz QOTD (Posted on December 18, 2020)
- Wentz QOTD – Day 365! (Posted on August 15, 2020)
- Wentz QOTD can be Tough! (Posted on August 11, 2020)
- CISSP PRACTICE QUESTIONS – 20190806 (Posted on August 6, 2019)
- CISSP PRACTICE QUESTIONS – 20190422 (Posted on April 22, 2019)
I came across this post about IKE and ISAKMP on Luke’s group and found it deserves further study. My suggested answers would be A (IKE) for the first question and D (ISAKMP) for the second because IKE is the implementation of ISAKMP. RFC 7296 “describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations
~ Jimmy, 暫時通過CISSP考試
The Guide to Product Ownership Analysis by IIBA introduces a fantastic diagram that nicely demonstrates the relationship between the organizational strategies, initiatives, products, projects, and agile mindset. It aligns with the PMI Organizational Project Management (OPM) framework, “a strategy execution framework utilizing project, program, and portfolio management as well as organizational enabling practices to consistently and predictably deliver organizational strategy producing better performance, better results, and sustainable competitive advantage.”
I added concepts of the PMI OPM and Agile to the diagram to see the whole.
Your organization has system administrators that have management control of server systems that contain highly confidential data which is critical to business continuity. What type of test is most appropriate to reveal your risk?
C. Third Party
D. None of the Above