Activity
Mon
Wed
Fri
Sun
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
What is this?
Less
More

Memberships

CyberMAYnia CAREER

204 members • Free

CISSP Study Group

1.8k members • Free

33 contributions to CISSP Study Group
Battled the beast and won!
Took my exam yesterday and it cut me off after the 100 question mark. I filled up the endorsement form and the waiting game begins. Special thanks to @Vincent Primiani for building such a supportive, encouraging community.
1 like • 2d
@Vivek Sridhar you Slayed it.
0 likes • 15h
@Vivek Sridhar how long in total did you study for the CISSP?
CISSP Practice Question (Domain 4: Communication and Network Security / Trust Boundaries & Attribution)
A global enterprise uses shared network infrastructure to support multiple business units with different regulatory obligations. During an investigation, encrypted internal traffic prevents determining which unit originated a noncompliant data transfer. Network design intentionally avoided segmentation to preserve agility. What is the MOST appropriate architectural control to introduce FIRST? A. Decrypt internal traffic at centralized inspection points B. Implement logical network zoning aligned to business and regulatory boundaries C. Increase application level logging to compensate for network opacity D. Require all business units to use separate encryption keys Come back for the answer tomorrow, or study more now!
2 likes • 17h
I was between B and D, but I believe it comes back again to ownership and control, therefore it has to be B
CISSP Practice Question (Domain 2: Asset Security / Data Ownership & Accountability)
A company migrates sensitive business data to a shared analytics environment used by multiple departments. Data accuracy issues emerge, but no single group can authorize correction because ownership is unclear. Leadership wants faster decisions without creating a centralized bottleneck. What is the MOST appropriate governance action to take FIRST? A. Assign a single enterprise data steward for all analytics data B. Define data ownership and decision authority at the dataset level C. Implement stricter change control over analytics transformations D. Increase audit logging for data modifications and access Come back for the answer tomorrow, or study more now!
2 likes • 3d
B) this is about governance, so as a minimum we need to start with Data Ownership.
2 likes • 3d
@Jamie Clamp if I’ve learn one thing trying to tackle CISSP, then it’s “No owner, no control.” 😉
Good Morning Future CISSPs!! - Practice Question (Domain 4: Communication and Network Security)
I felt like such a robot 🤖 posting the question this morning. I needed to say hello to all our wonderful members!! Okay, okay, the question... A company deploys a zero trust network where every request is authenticated, authorized, and encrypted. During an incident, investigators cannot reconstruct attack paths because traffic patterns are indistinguishable once inside the fabric. Security wants forensic clarity without weakening zero trust principles. What is the MOST appropriate architectural adjustment? A. Decrypt and inspect all internal traffic at centralized gateways B. Implement per request cryptographic identity and flow labeling C. Increase east west traffic logging at network choke points D. Reintroduce internal trust zones to simplify attribution Come back for the answer tomorrow, or study more now!
0 likes • 4d
B seems the only logical solution
0 likes • 4d
@Vincent Primiani hey Vincent, I’m with @Vivek Sridhar , I love these questions and over the least week (post op) I’ve been unable do them when they’re received, but they’ve sat there tempting me to come and try them, you’ve kept me going both CISSP Study wise and knowing this study group is here is awesome, it feels like a collaborative, supportive family. Thank you.
CISSP Practice Question (Domain 6: Security Assessment and Testing)
A company uses red team exercises to validate detection and response capabilities. After several successful simulations, leadership concludes incident readiness is high. An independent review finds that scenarios are reused and defenders have begun anticipating tactics. Management wants realistic assurance without increasing test frequency. What is the MOST appropriate change to make? A. Rotate red team members to reduce defender familiarity B. Introduce threat informed testing with adaptive scenario design C. Increase reliance on automated attack simulation tools D. Separate detection and response teams during exercises Come back for the answer tomorrow, or study more now!
2 likes • 4d
For me it’s B) Introduce threat‑informed testing with adaptive scenario design This addresses the core problem: Scenarios evolve based on current threat intelligence, tactics shift during the exercise, defenders cannot rely on pattern recognition, assurance improves without increasing frequency there’s no need to separate the teams that need to collaborate in a real IR, This will keep the approach fresh, without constant practice.
1-10 of 33
Allison Regan
4
82points to level up
@allison-regan-1007
Electronics engineer working on transitioning into the cybersecurity field. Proud to have passed, CompTIA Security+, ISC2 CC, CSA CCSK & CCZT CCEP

Active 15h ago
Joined Nov 15, 2025
Scotland. United Kingdom
Powered by