Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
What is this?
Less
More

Memberships

CyberMAYnia CAREER

417 members • Free

CyberMAYnia Club

61 members • Free

Symoné GovTech Community(Free)

21.9k members • Free

The Cyber Community

8.5k members • Free

CISSP Study Group

2.1k members • Free

170 contributions to CISSP Study Group
CISSP Practice Question (Domain 4: Communication and Network Security - Zero Trust)
Your company adopts Zero Trust and replaces the legacy VPN with identity-based access for remote workers. Six weeks in, helpdesk tickets spike: users complain that access to internal apps breaks unpredictably throughout the day. What is the MOST likely root cause? A. Insufficient bandwidth at the identity provider B. Continuous authentication is re-evaluating trust signals and revoking sessions C. DNS resolution failures between the client and the policy enforcement point D. Certificate pinning conflicts with the new SSO provider Come back for the answer tomorrow, or study more now!
0 likes • 6d
b
CISSP Practice Question (Domain 7: Security Operations - AI Exam Guidance)
Your SOC integrates an AI-driven SOAR platform that auto-remediates low-severity alerts. After three months, analysts notice the model's false positive rate has doubled and it is closing legitimate incidents without investigation. What should the SOC manager address FIRST? A. Revert to manual triage until the model is retrained on updated threat data B. Evaluate the model for drift and establish ongoing performance monitoring baselines C. Escalate to the vendor and demand a root cause analysis under the SLA D. Increase analyst headcount to manually review all auto-closed incidents Come back for the answer tomorrow, or study more now!
0 likes • 27d
C.
CISSP Practice Question (Domain 2: Asset Security - AI Exam Guidance)
A financial services firm acquires a pre-trained ML model from a third-party vendor for fraud detection. During onboarding, the security team discovers the vendor cannot provide documentation on the origin of the training dataset. What should the CISO address FIRST? A. Commission an independent bias audit before production deployment B. Classify the model and its training data as high-value intellectual property C. Assess whether the undocumented data sourcing introduces unmanageable supply chain risk D. Require the vendor to retrain the model using only internally sourced datasets Come back for the answer tomorrow, or study more now!
0 likes • 27d
C.
CISSP Practice Question (Domain 5: Identity and Access Management)
A newly acquired subsidiary uses a separate identity provider with no federation to the parent company. Executives want immediate single sign-on access to the subsidiary's financial reporting system. The subsidiary's IT team warns their directory contains orphaned accounts from prior layoffs. What should you address FIRST? A. Establish federated trust between both identity providers B. Perform an access review and remove orphaned accounts in the subsidiary's directory C. Provision executive accounts directly in the subsidiary's identity provider D. Implement multi-factor authentication on the financial reporting system Come back for the answer tomorrow, or study more now!
0 likes • Mar 14
B
1-10 of 170
Alton Butler
4
81points to level up
@alton-butler-7209
Just wanting to learn and pass the CISSP.

Active 3d ago
Joined Jul 7, 2024
Powered by