(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests Paperback – 13 June 2018
|New from||Used from|
Frequently bought together
From the Back Cover
Provides four complete, unique practice tests and 100 additional questions per domain covering all current CISSP exam objectives
Complements the Sybex (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, Eighth Edition
Smarter, faster prep for the CISSP exam
The (ISC)2 CISSP Official Practice Tests provides 1,300 unique questions with detailed answers and explanations to help you solidify your knowledge in advance of taking the CISSP exam. Test your understanding--and your test-taking strategy--with four unique practice exams designed to mimic the real thing. The high-stakes CISSP exam covers all aspects of information security, with in-depth coverage of a diverse set of specialties. These are the only practice exams endorsed by (ISC)2, and together with the (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, give you the ultimate resource for complete CISSP exam preparation.
Coverage of all exam objectives in these practice tests means you'll be ready for:
- Security and Risk Management
- Asset Security
- Security Architecture and Engineering
- Communication and Network Security
- Identity and Access Management (IAM)
- Security Assessment and Testing
- Security Operations
- Software Development Security
Interactive learning environment
Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, visit www.wiley.com/go/cissptestprep, register to receive your unique PIN, and instantly gain one year of FREE access to the interactive test bank with four practice exams. 1,300 questions total!
ABOUT THE CISSP CERTIFICATION
The CISSP is the most globally recognized certification in the information security market. This vendor neutral certification validates an information security professional's deep technical and managerial knowledge and experience to effectively design, engineer, and manage the overall security posture of an organization. (ISC)2 is a global nonprofit organization that maintains the Common Body of Knowledge for information security professionals. Candidates must have experience, subscribe to the (ISC)2 Code of Ethics, and maintain continuing education requirements or recertify every three years. Visit www.isc2.org to learn more.
About the Author
No customer reviews
|5 star 100% (100%)||100%|
|4 star 0% (0%)||0%|
|3 star 0% (0%)||0%|
|2 star 0% (0%)||0%|
|1 star 0% (0%)||0%|
Review this product
Most helpful customer reviews on Amazon.com
Edit- This book is terrible. Do not use. The author rewrites questions from the old book and changes the language which often times makes the answers wrong. This is a poorly written and inaccurate version of the old book with a few questions added.
For instance in this book - Segmentation, sequencing, and error checking all occur at what layer of the OSI model that is associated with SSL, TLS, and UDP? Answer (Transport Layer) Just wrong. Session layer for TLS and SSL and Transport Layer for UDP.
(Old Book) - Lauren uses the ping utility to check whether a remote system is up as part of a penetration testing exercise. If she wants to filter out ping by protocol, what protocol should she filter out from her packet sniffer's logs? ICMP.... Makes Sense
(This Book) - Lauren uses the ping utility to check whether a remote system is up as part of a penetration testing exercise. If she does not want to see her own ping packets, what protocol should she filter out from her packet sniffer’s logs? True, but it doesn't make sense because she wouldn't see the replies either... just dumb.
I bought this book, studied and passed all 12 exams in it, by comfortable margins - then studied every question I got wrong. No help, since this book is unrelated to the test.
Even the author's questions on his own topics are often wrong. He'll use a question twice, but it has different answers in different chapters. Incorrect database terminology too.
Don't buy this piece of crepe from a lazy author. He just recirculated some questions from an older book. It's garbage.