Jump to content

azika

Members
  • Posts

    47
  • Joined

  • Last visited

Posts posted by azika

  1. @yalhooif you finish module (1) in less than 3 hrs, whatever time you have left is not transferred to module 2 (configuration), once you start module 2 you have exactly 5 hours allocated to you.

    If you somehow start configuration when you haven't seen the questions for module 2, you open yourself up for Cisco to know you have cheated, this means you have seen the exam questions beforehand.  

    • Like 3
  2. Hi wooo, there are no dumps for CISSP. No vendor has CISSP dumps if they try to market one to you don't buy. Study the exam is not difficult but requires you to know a little of lots of topics. It is not deep but wide and you will be better for it.

     

    Many have shared resources in the forum already, search and you will find useful study guides and videos, there are 8 domains, study topics that have to do with GDPR, software development and other areas are not already familiar with, you should be ok, there is no real practice exam I used that was anyway close to the real exam.

    The exam test your ability to apply the knowledge, question ask you for the BEST answer, options normally have more than one correct answer. The answer is usually the options that covers the MOST area.

    Example: VPN will be the BEST answer to connect over the Internet than GRE etc.

    Goodluck

    • Like 3
    • Thanks 1
  3. Thanks for sharing your exam experience, I know a lot of people have had positive and negative reactions to your post, but I believe you have done a great service to so many others.

    Sharing your experience about a particular vendor is based on your experience with them, others have had similar poor experiences with other vendors as well and don't share because of the negative reactions they will face. It is left for each person to make up their mind on what they want to believe.

    I would feel hurt and warn others if I had the same experience after spending should a huge amount of money. Thanks once more for the courage to share your experience.

     

    • Like 2
  4. As NiceGuy said, the best position is at the Perimeter of the Network, where you connect to external networks (Internet edge). As best practice you also need to have firewall internally in your network.

    The internal firewalls are usually referred to Internal Segmentation Firewall (ISFW), these are used to separate for example department traffic from one another. You don't want your internal users to reach every important asset inside your business.

    For example, you want only HR employees to reach the HR servers that contains all employee information (addresses, salary information etc), so you create rules in the ISFW that only allow the HR employee to reach that server and no one else.

    • Like 2
×
×
  • Create New...