This seems to be the CBK that I’m having the hardest time on, mostly because I know how to exploit the network very well, but do not have as much experience in configuring it. I passed though. 🙂
Funniest part is after another full week of studying it – I still got the same grade!!! HAHA!
Now that I’ve finished the first 1200 page book, it’s time to move onto the second 1,000 page book. Is the week over yet?!?
It all seems like a lot of common sense, but there were quite a few terms that the All-In-One book didn’t cover for this CBK; some of the questions were tricky too regarding “whose responsibility is it”…
I think I definitely know out of all the CBK’s which is my strength so far… 🙂
I’ll be interesting to see how I do on application security.
Wow – this networking CBK was rough – there has to be like a gazillion networking terms that need to be memorized. The thing is, what I’m kind of frustrated about, is I don’t see much emphasis being placed on the security of the networking technology, more about the networking technology itself. It’s almost like you’re going for a CompTIA +Network. I did quite well on the CBK test – but I really REALLY need to review this chapter again if I get a chance…
I am now well versed in fence heights, and chain diameters, fire extinguishers, and IDS systems. My score was actually higher than this too – as I found at least one bug in the testing software where it said my answer was the correct answer, but then marked it wrong :-0
This was probably the most extensive learning I had to do so far in the CISSP around the different security Models, like the Bell-LaPidula, the Biba, the Clark-WIlson, the Graham-Dennig and the Harrison-Ruzzo-Ulllman security Models… you have all that right? LoL
Funniest part is, I scored almost 100% on almost all of the concepts except: I couldn’t seem to make the distinction between multiprocessing, multiprogramming, mutithreading and multitasking – how lame is that!
Oh, and I was exposed to a very cool side-channel attack (or more appropriately called a covert storage attack) having to do with information flow.. with an example of using storage state (like files being locked and unlocked) to steal data one bit at a time… that was pretty neat thinking!
Anyway – after 120 pages of very extensive reading under Security Architecture – I’m off to the next CBK starting tomorrow.
I read over a 100 pages last night, and there was SO much information and acronyms galore! I have a really good understanding of Access Control, but I still learned a bunch!
I have to do school reading tonight, so I’m going to unfortunately be behind now in the CISSP review, but I’ll have the weekend to try and catch up!
Oh, and I found out that I can read SO much more a night if I shut down my computer and put it away! There is too much tempting me on the computer to actually keep me from peaking and playing every couple minutes… I need better attention skills! LoL
Roughly 4 hours a night for the last week studying 200 pages so far in my 1200 page book… I took a full exam tonight covering the first CBK of Information Security – and the results were promising! 🙂