Saaz's CISSP students

Discussion in 'CISA/CISM/CISSP' started by SUNDARARAJAN PADMANABHAN(3066), Oct 30, 2015.

  1. SUNDARARAJAN PADMANABHAN(3066)

    Alumni

    Joined:
    Apr 28, 2013
    Messages:
    6
    Likes Received:
    2
    This is the study notes section for sharing for all the CISSP aspirants
     
    #1
  2. SUNDARARAJAN PADMANABHAN(3066)

    Alumni

    Joined:
    Apr 28, 2013
    Messages:
    6
    Likes Received:
    2
    A patent is a right granted to the owner of an invention that prevents others from making, using, importing or selling the invention without his permission.
    What is the term of the Patent subject to the payment of annual renewal fees?

    a. 20 years from Date of Patent Approval
    b. 20 years from Date of Patent Registration
    c. 17 years from Date of Patent Approval
    d. 17 years from Date of Patent Registration
     
    #2
    MANOJ_37 likes this.
  3. SUNDARARAJAN PADMANABHAN(3066)

    Alumni

    Joined:
    Apr 28, 2013
    Messages:
    6
    Likes Received:
    2
    Note: A design patent is generally granted protection for 14 years measured from the date the design patent is granted
     
    #3
    Kunal_Shah likes this.
  4. SUNDARARAJAN PADMANABHAN(3066)

    Alumni

    Joined:
    Apr 28, 2013
    Messages:
    6
    Likes Received:
    2
    A copy of evidence gathered in a computer targeted crime scene is referred to as?

    A. Circumstantial evidence
    B. Secondary evidence
    C. Hearsay
    D. Conclusive
    E. Legal
     
    #4
  5. Kunal_Shah

    Kunal_Shah Member
    Alumni

    Joined:
    Oct 30, 2015
    Messages:
    5
    Likes Received:
    1
    b. 20 years from Date of Patent Registration
     
    #5
  6. Kunal_Shah

    Kunal_Shah Member
    Alumni

    Joined:
    Oct 30, 2015
    Messages:
    5
    Likes Received:
    1
    C. Hearsay
     
    #6
  7. Kunal_Shah

    Kunal_Shah Member
    Alumni

    Joined:
    Oct 30, 2015
    Messages:
    5
    Likes Received:
    1
    Buffer overflows because:
    a. buffers can only hold so much data.
    b. input data is not checked for appropriate length at time of input.
    c. they are an easy weakness to exploit.
    d. of insufficient system memory.
     
    #7
  8. SUNDARARAJAN PADMANABHAN(3066)

    Alumni

    Joined:
    Apr 28, 2013
    Messages:
    6
    Likes Received:
    2
    b
     
    #8
  9. SUNDARARAJAN PADMANABHAN(3066)

    Alumni

    Joined:
    Apr 28, 2013
    Messages:
    6
    Likes Received:
    2
    the key is "copy of evidence" and not the computer evidence!. I got tricked as well on this, hence posted for all of us. Secondary evidence!
     
    #9
  10. Kunal_Shah

    Kunal_Shah Member
    Alumni

    Joined:
    Oct 30, 2015
    Messages:
    5
    Likes Received:
    1
    I thought the same. But the answer is "d. of insufficient system memory". I haven't understood yet. But may be if they have mentioned "To avoid buffer overflow" it would have been proper answer.
     
    #10
  11. Kunal_Shah

    Kunal_Shah Member
    Alumni

    Joined:
    Oct 30, 2015
    Messages:
    5
    Likes Received:
    1
    SUNDARARAJAN Do u have download links for 29th and 30th Oct sessions.
     
    #11
  12. Ramesh Raja

    Ramesh Raja Member
    Alumni

    Joined:
    Sep 29, 2015
    Messages:
    2
    Likes Received:
    0
    Hi Saaz,

    Can you please explain the concept of 'Blockchains' (with emphasis to the technology behind bitcoin or even Napster that got shut off). Thanks a bunch!
     
    #12
  13. jmurray59

    jmurray59 New Member
    Alumni

    Joined:
    Sep 15, 2015
    Messages:
    1
    Likes Received:
    1
    Most granted patents issued are utility patents - approximately 6000 per week from the USPTO. There are also design, plant, and reissue patents issued which may have shorter terms and exceptions. The general term is 17 years from grant date (20 from initial application filing date - they anticipate 3 years from application to grant). Like everything there are exceptions. However, since mid-1995 the term has been 20 years from initial application filing date - therefore I would say "B"
     
    #13
    Last edited: Nov 17, 2015
    Kunal_Shah likes this.
  14. Kartik_4

    Kartik_4 Member
    Alumni

    Joined:
    Nov 3, 2015
    Messages:
    3
    Likes Received:
    0
    a
     
    #14
  15. Kartik_4

    Kartik_4 Member
    Alumni

    Joined:
    Nov 3, 2015
    Messages:
    3
    Likes Received:
    0
    #15
  16. vanditapanigrahi(2103193)

    Alumni

    Joined:
    Oct 22, 2014
    Messages:
    1
    Likes Received:
    0
    d
     
    #16
  17. Ramesh Raja

    Ramesh Raja Member
    Alumni

    Joined:
    Sep 29, 2015
    Messages:
    2
    Likes Received:
    0
    Saaz, any study groups that we can join for domain study notes sharing?
     
    #17
  18. MANOJ_37

    MANOJ_37 Member
    Alumni

    Joined:
    Dec 8, 2015
    Messages:
    2
    Likes Received:
    0
    a
     
    #18
  19. MANOJ_37

    MANOJ_37 Member
    Alumni

    Joined:
    Dec 8, 2015
    Messages:
    2
    Likes Received:
    0
    A
     
    #19
  20. Rashmi.K (3853)

    Alumni

    Joined:
    Jul 22, 2014
    Messages:
    9
    Likes Received:
    0
    Hi Saaz, Could you please suggest me some CISSP books for certification.
     
    #20
  21. william bailey(1227)

    william bailey(1227) Active Member
    Trainer

    Joined:
    Sep 20, 2013
    Messages:
    40
    Likes Received:
    5
    The ebook that you can download from the LMS has all of the slides, with some additional notes for some slides.
    Most other textbooks that have been published are based on the prior version of the CBK. Older books may not match the current security best practices.
     
    #21
  22. Nagaprasad S(2885)

    Nagaprasad S(2885) New Member
    Alumni

    Joined:
    Jul 29, 2014
    Messages:
    1
    Likes Received:
    0
    GM of IT Security in a company is planning to outsource
    • Networking components
    • Storage
    • Hardware
    • Servers
    • Operating Systems
    I think the right service model is IaaS as it covers both Infrastructure and platform. Is it correct?
     
    #22
  23. Saaz  Rai(1365)

    Saaz Rai(1365) Well-Known Member
    Trainer

    Joined:
    Nov 2, 2012
    Messages:
    94
    Likes Received:
    13
    PaaS covers both Infrastructure and Platform.
     
    #23
    SANJAY KUMAR TIWARI likes this.
  24. Umar Siddiqi

    Umar Siddiqi Member
    Alumni

    Joined:
    May 31, 2016
    Messages:
    3
    Likes Received:
    0
    The first question in the first simulation exam in LMS goes like this:

    Identification and authentication are the two important steps of the Access Control process. Which of the following statements best describes these terms?
    a. Authentication is a means to verify who you are, while identification is what you are authorized to perform.
    b. Identification is a child process in authentication.
    c. Identification is another name of authentication.
    d. Identification is a means to verify who you are, while authentication is what you are authorized to perform.

    This question is very confusing. The correct answer turns out to be (d) but I have issues with it because as far as I can tell authentication is the method of verifying the identity using password or other means. It's actually authorization that determines what actions you can perform once you are authenticated. Please correct me if I am wrong. So I selected option b assuming that in authentication you have to first identify yourself (using a username etc) and prove your identity using various factors. So identification is like a part of authentication. But that was the wrong answer and the correct answer also doesn't seem right to me as authentication is not what it says it is in this answer. So it's kind of conflicting as I would never have chosen option d based on what I have studied so far.

    So I want to know the opinion of other students and teachers on this. Thanks.
     
    #24
  25. Saaz  Rai(1365)

    Saaz Rai(1365) Well-Known Member
    Trainer

    Joined:
    Nov 2, 2012
    Messages:
    94
    Likes Received:
    13
    You are correct in your assessment. (d) is not the correct answer.

    Identification = who you claim to be (eg. username)
    Authentication = prove your claim (eg. password)
     
    #25
    SANJAY KUMAR TIWARI likes this.
  26. Umar Siddiqi

    Umar Siddiqi Member
    Alumni

    Joined:
    May 31, 2016
    Messages:
    3
    Likes Received:
    0
    Thanks Saaz. So does it mean that we should not totally rely on LMS mock exams? Is there a way to report this error to simplilearn? I wonder how many other such questions exist and this can be the difference between passing and failing the exam.
     
    #26
  27. Saaz  Rai(1365)

    Saaz Rai(1365) Well-Known Member
    Trainer

    Joined:
    Nov 2, 2012
    Messages:
    94
    Likes Received:
    13
    I have informed the relevant team to look into this. They are verifying if this is a technical bug or an error. In the meantime, kindly continue with the mock exams.
    Do let me know if you come across any other issue.
     
    #27
  28. Vinutha

    Vinutha Manager
    Staff Member

    Joined:
    Jan 30, 2015
    Messages:
    275
    Likes Received:
    96
    Hi Umar,

    Apologies for the incovenince caused, we are getting these papers reviewed to overcome such issues in the future. Since the question papers are lengthy with 250 questions each, there can be one or two instances where the options are not right. Please share the test paper and question no with us that would help in recitifying such issues.
     
    #28
  29. Vinutha

    Vinutha Manager
    Staff Member

    Joined:
    Jan 30, 2015
    Messages:
    275
    Likes Received:
    96
    Hi Saaz,

    The question states which of the terms best describes these terms? The explanation provided by us, clearly states why option d is right. Please help me understand if the explanation given also needs to be changed or not and what should it be.
     
    #29
    Last edited: Jul 28, 2016
  30. SATYAPAL KUMAR_1

    SATYAPAL KUMAR_1 New Member

    Joined:
    Mar 12, 2016
    Messages:
    1
    Likes Received:
    0
    Hello Friends,

    Have anyone cleared the CISSP exam after syllabus changes? Please share your input.
     
    #30
  31. Saaz  Rai(1365)

    Saaz Rai(1365) Well-Known Member
    Trainer

    Joined:
    Nov 2, 2012
    Messages:
    94
    Likes Received:
    13
    d. Identification is a means to verify who you are, while authentication is what you are authorized to perform.

    Authorization and not Authentication verifies what you are authorized to perform.
     
    #31
  32. Saaz  Rai(1365)

    Saaz Rai(1365) Well-Known Member
    Trainer

    Joined:
    Nov 2, 2012
    Messages:
    94
    Likes Received:
    13
    I receive an email almost every week from our students who have passed the CISSP exam. They claim that the exam is not as difficult as they had anticipated. There seems to be more focus on the newer technologies like IoT, SCADA etc.
     
    #32
  33. SANJAY KUMAR TIWARI

    SANJAY KUMAR TIWARI Active Member
    Alumni

    Joined:
    Jul 25, 2017
    Messages:
    22
    Likes Received:
    0
    20 years from Date of Patent Approval
     
    #33

Share This Page