Explore


CCISO Sample Questions (Part 2)

CCISO Sample Questions (Part 2)

1.       Which wireless encryption technology makes use of temporal keys? Options are: Extensible Authentication Protocol (EAP) Wireless Equivalence Protocol (WEP) Wireless Application Protocol (WAP) Wifi… ...
Information Security Vulnerability List – 2

Information Security Vulnerability List – 2

No Vulnerability 151 User id’s based on job description 152 No user identification and authentication 153 Weak password management system 154 Unrestricted use of system… ...
Information Security Vulnerability List – 1

Information Security Vulnerability List – 1

Information Security Vulnerability List – 1 No Vulnerability 1 Disposal or reuse of storage media without proper erasure 2 Inadequate change control 3 Inadequate network… ...
Useful KPIs for a Security Operation Center (SOC)

Useful KPIs for a Security Operation Center (SOC)

Useful KPIs for a Security Operation Center (SOC) No KPI 1 The percentage of phishing emails opened by your end-users 2 Phishing emails informed by… ...
iTop Add a new field (Owner) to Configuration Item

iTop Add a new field (Owner) to Configuration Item

Here we are creating a custom module to add an additional field which is of object type contact  to the FunctionalCI Class which is the… ...