Page 231 - CISSO_Prep_ Guide
P. 231

and key areas so that the class becomes a review and
            reinforcement for their knowledge rather than an introduction to
            previously unknown topics.

            Most candidates will benefit from an organized study plan that
            focusses on each topic area in a scheduled manner. Even more,
            selecting one topic area at a time allows the mind to focus on
            that area without jumping continuously from topic to topic in a
            disorganized manner. It must be remembered that activity is not
            a substitute for progress, and just flipping back and forth in
            pages in a book is not a substitute for really studying a topic and
            working with it until it is fully understood. The candidate should
            pay close attention to areas that are vague or poorly understood
            and seek to work on those areas until they are well-known and
            properly understood. You know a topic has become clear for
            you when you can describe it simply to another person. It is
            advised that you do not skip over the tough areas and just focus
            on the familiar - that is much easier from a confidence point of
            view but will leave significant holes in the study program and
            may lead to failure on the examination.

            Remember that the examination is not based on simple
            knowledge. The candidate must be able to analyze the topic and
            options addressed in the exam question and, from that analysis,
            select the BEST answer. A thorough understanding of the topics
            and how to use (apply) those topics in a real-world setting is the
            key to success. When studying, it is important to link topics
            together - understand the relationships between topics, tools,
            procedures, and the linkage between information security and
            business objectives. Remember, the reason for the security is to
            support business requirements, not just to be secure.
   226   227   228   229   230   231   232   233   234   235   236