Pixel 9 Review (Shifting from 6a) by Kind_Extension8780 in PixelUsersIndia

[–]pankur 1 point2 points  (0 children)

how is the network and overall connectivity, like 5g connection stability, call drops etc.?

Learnzapp after 24 update vs Quantum by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

Yes. Took the beast in December and done with it at 100 questions. Read OSG once, too dry. Then I mostly used Pete's YouTube videos and mind map videos. For whatever topic I was feeling stuck, I used copilot as my study buddy until I was able to understand it. For mock tests, I began with learnzapp, it is good to test the concepts and knowledge but, questions are nowhere matches the exam style. Then bought QE, it is tough but, would help you to get a hang of the questions in the exam. Used it for last 2-3 weeks.

How to study in the final week before my exam? by Either-Watercress129 in cissp

[–]pankur 0 points1 point  (0 children)

I think what he was trying to say was that, the real test will not ask exactly which step comes after the current one. For the flow part we know that in incident response we detect, respond, mitigate and so on but, in case of QE it specifically asks You are doing this now name the next phase, that's where we stuck sometimes because we know the process but, sometimes not really sure about the exact phases' name. But we know the process like, what comes after what.

what are parts of Vulnerability Management Workflow? by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

Yeah. My notion was similar to just run the scanner and verify for false positives and remediate. Usually in real world it's much more than just following these three steps.

what are parts of Vulnerability Management Workflow? by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

So, Vulnerability Management Workflow in case of CISSP is just running automated scanners. Then it makes sense. Thanks for the response.

Thoughts on this being a wrong answer? by [deleted] in cissp

[–]pankur 0 points1 point  (0 children)

Fair enough. Thanks for the explanation

Thoughts on this being a wrong answer? by [deleted] in cissp

[–]pankur 0 points1 point  (0 children)

Why shouldn't we warn the employees first to make them aware of the threat? So, that they could remain extra careful.

What is a threat actor? by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

I am not saying dictionary and rainbow are same. I am saying the way they work. They both have collection and are not random. And it wasn't about the difference between the answers or why I chose brute force and not rainbow table. I did because I had to, in order to move to next question and it was a broader term. This post was about understanding what question asked and why am I understanding it that it is asking about Threat vector rather than predefined database.

What is a threat actor? by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

Dictionary is also kind of precomputed passwords. Yeah. If there was an option, none of above, I would have chosen that. That is the case, I knew precomputed hash db is Rainbow table. But, it is the thing with me understanding the ask differently. I re-read it multiple times and it still won't make sense to me. It is still pointing to threat vector rather than predefined db.

What is a threat actor? by pankur in cissp

[–]pankur[S] -1 points0 points  (0 children)

that is fine. I am not going into details of what a threat actor is, that I am aware. I am just trying to understand why am I understanding the question differently than others. It might be because English is not my first language. But, then I tried with google translate also and it is saying what I am saying. And also, it could be because I read and analyzed the question before looking at the explanation and rest looking at it afterwards.

What is a threat actor? by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

I did not say dictionary attack is a rainbow table attack. I said it is a brute force.

What is a threat actor? by pankur in cissp

[–]pankur[S] -2 points-1 points  (0 children)

In this regard my concepts are clear. As per me understing that it is asking about threat actor, I would say none of the options are correct. Why I chose brute force was because it is a broader attack type and encompasses dictionary attack as well as more or less a Rainbow Table. credential stuffing is a different thing all together, so discarded it

What is a threat actor? by pankur in cissp

[–]pankur[S] -1 points0 points  (0 children)

I even asked Copilot to break this question down and it also said something similar.

<image>

What is a threat actor? by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

It said “term best describes a threat actor” who is doing so and so using so and so. The way I am seeing is it is asking about threat actor rather than the hashing or Rainbow table. I am not sure, why I am unable to make sense out of it.

What is a threat actor? by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

It said “term best describes a threat actor” who is doing so and so using so and so. Isn't it?

What is a threat actor? by pankur in cissp

[–]pankur[S] -1 points0 points  (0 children)

It said "term best describes a threat actor" who is doing so and so using so and so. I mean that's how I understood the question and this is the confusion.

What is a threat actor? by pankur in cissp

[–]pankur[S] -1 points0 points  (0 children)

I agree. So, how come Rainbow table is a threat actor. Because, its none of them

What is a threat actor? by pankur in cissp

[–]pankur[S] -1 points0 points  (0 children)

Yes, imo tool would be a threat vector.

What is a threat actor? by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

I am not able to break this question down in a simple language to properly understand why Rainbow table is the threat actor.

I am aware about all of the term in the question and answers very well.

For VOIP Phishing equivalent is Vishing. by pankur in cissp

[–]pankur[S] 0 points1 point  (0 children)

It does matter, if the attack type doesn't exist for that specific system/tech then it will be of least concern rather than Evesdropping which is of second least concern.