Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Owned by Vincent

CISSP Study Group

1.9k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

OpenAI Study Group

1 member • Free

Share resources, get advice, and connect with peers studying for OpenAI certifications! Join our Study Group and meet fellow professionals today!

Memberships

CyberMAYnia CAREER

222 members • Free

Skoolers

190.1k members • Free

700 contributions to CISSP Study Group
CISSP Practice Question (Domain 1: Security and Risk Management)
An organization's CISO discovers that a third-party SaaS vendor processing customer PII has been acquired by a foreign company. The acquiring company is headquartered in a jurisdiction with government data access laws that conflict with the organization's regulatory obligations under GDPR. The vendor contract has 18 months remaining. What should the CISO do FIRST? A. Invoke the contract's termination-for-convenience clause and begin immediate vendor transition planning B. Conduct a risk assessment to evaluate the change in data sovereignty exposure and regulatory compliance impact C. Require the vendor to migrate all customer data to data centers located within approved jurisdictions D. Notify the Data Protection Authority and affected customers of the potential cross-border data transfer Come back for the answer tomorrow, or study more now!
CISSP Practice Question (Domain 8: Software Development Security)
A development team integrates a generative AI coding assistant that was trained on public repositories. The tool accelerates feature delivery but occasionally references deprecated libraries. Legal warns that AI-generated code may contain license violations or expose proprietary logic if the model was trained on leaked internal code. What should the security manager do FIRST? A. Engage legal counsel to review the AI vendor's training data sources and contractual indemnification clauses B. Implement software composition analysis (SCA) and require all AI-generated code to be digitally signed before commit C. Restrict the AI tool's access to internal repositories and enforce output review through secure-coding peer validation D. Retrain or fine-tune the AI model using only vetted, license-compliant code from approved sources
1 like • 16h
@Shane Symons I don't see a specific "style" format saved from our previous conversations. Could you share the answer style/template you'd like me to use, or would you like me to answer this in a standard CISSP exam prep format? In the meantime, here's my analysis: Correct Answer: A Why A is correct: This is fundamentally a governance and risk management issue before it becomes a technical control issue. The FIRST action must address the legal and contractual exposure — understanding what the organization is liable for, what indemnification exists, and whether the training data creates IP/licensing risk. You can't implement effective controls until you understand the actual risk landscape. Why the others are wrong: - B (SCA + signing): Good technical controls, but implementing them before understanding the legal exposure puts the cart before the horse. What if the vendor agreement already indemnifies you? What if the tool is fundamentally unusable due to licensing? - C (Restrict access + peer review): Operational control that mitigates symptoms but doesn't address root cause. Also, "FIRST" implies sequencing — you'd implement this after understanding your risk posture. - D (Retrain/fine-tune): Assumes you own or control the model. Most organizations use third-party AI assistants — retraining isn't typically an option, and even if it were, it's expensive and time-consuming. CISSP Lens: Domain 8 intersects heavily with governance here. The question tests whether you recognize that risk assessment and legal due diligence precede technical controls in the risk management lifecycle.
CISSP Practice Question (Domain 2: Asset Security)
An organization allows multiple business units to deploy their own AI agents using shared enterprise data lakes. Each unit claims ownership of its AI outputs, while data sources remain centrally managed. A dispute arises after an AI-generated report exposes sensitive correlations between departments. What is the MOST appropriate action to take FIRST? A. Reclassify the AI-generated outputs under the highest data sensitivity level B. Clarify and formally assign data ownership and stewardship for AI-derived assets C. Segregate AI workloads by business unit to prevent cross-correlation D. Implement stronger access controls on the shared data lake Come back for the answer tomorrow, or study more now!
1 like • 2d
Answer: B The correct answer is B: Clarify and formally assign data ownership and stewardship for AI-derived assets. Explanation: This question emphasizes taking action "FIRST" in response to a data governance conflict. The scenario presents a situation where multiple business units claim ownership of AI outputs generated from centrally managed data, resulting in a data privacy dispute. CISSP Domain 2: Asset Security focuses on protecting organizational assets, including data governance and stewardship. When an AI governance conflict arises, the FIRST priority must be establishing clear ownership and accountability structures. Why B is correct: - Governance comes FIRST: Before implementing technical controls, reclassification, or segregation, you must establish who owns what. This is foundational to all other security measures. - - Establishes accountability: Once ownership is clear, you can determine who is responsible for data classification, access controls, and breach response. - - Prevents future conflicts: Formal assignment prevents competing claims and establishes a single source of truth for data stewardship. Why the other options are incorrect: - A (Reclassify): This is a consequence of establishing ownership, not the first action. You cannot properly classify AI outputs without knowing who owns them. - - C (Segregate): Segregation is a technical control that addresses symptoms, not the root governance problem. - - D (Access controls): Implementing access controls before clarifying ownership is like changing locks on a house where ownership is disputed—it doesn't resolve the fundamental issue. This aligns with the principle that governance precedes controls in the CISSP framework.
CISSP Practice Question (Domain 1: Security and Risk Management)
An organization deploys an AI system that recommends layoffs and budget cuts based on financial and productivity data. Executives approve its use but do not fully understand its decision logic. The recommendations align with profits but raise ethical and reputational concerns internally. What is the MOST appropriate action for the security leader? A. Require human review of all AI-generated workforce decisions B. Document the risk acceptance and ethical considerations in governance records C. Suspend the AI system until explainability requirements are met D. Conduct a privacy impact assessment focused on employee data Come back for the answer tomorrow, or study more now!
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A financial services company needs to share highly sensitive customer transaction data with a third-party analytics provider. The company's legal department mandates that the third-party must be able to perform statistical analysis on the data, but the data must remain encrypted at all times, including while it is being processed by the provider's algorithms to ensure the company never loses control over the plaintext. What is the MOST appropriate cryptographic solution to meet this requirement? A. Symmetric encryption using AES-256 with a managed Key Vault B. Asymmetric encryption using RSA-4096 with Perfect Forward Secrecy C. Homomorphic encryption D. Quantum-resistant cryptography
2 likes • 7d
@Harrison Efijemue The correct answer is C. Homomorphic encryption. The CISSP Logic This question tests your knowledge of Data-in-Use protection and emerging cryptographic technologies. - The Technical Constraint: The prompt specifies that the data must remain encrypted while it is being processed. - The Limitation of Traditional Crypto: Standard symmetric (AES) and asymmetric (RSA) encryption require data to be decrypted into plaintext within a system's memory (RAM) before a CPU can perform mathematical operations on it. This creates a "window of vulnerability" where a compromised server or a malicious insider at the third party could access the plaintext. - Why Homomorphic Encryption is Correct: This is a specialized category of encryption that allows computations to be performed directly on ciphertext. The resulting ciphertext, when decrypted by the data owner, matches the result of the operations as if they had been performed on the original plaintext. This perfectly satisfies the legal requirement of never losing control over the plaintext. Distractor Analysis - A. Symmetric encryption (AES-256): While AES is the gold standard for Data-at-Rest, the analytics provider would need the decryption key to perform any analysis. This would expose the plaintext to the third party, violating the mandate. - B. Asymmetric encryption (RSA-4096): Primarily used for Data-in-Transit (key exchange and digital signatures), RSA also requires decryption before data processing. - D. Quantum-resistant cryptography: These are algorithms designed to withstand attacks from future quantum computers (e.g., lattice-based cryptography). While it addresses future threats to Confidentiality, it does not provide the functional capability to process encrypted data. Real-World Check Homomorphic encryption is the "holy grail" of privacy-preserving analytics. While historically very slow and computationally expensive, it is seeing real-world adoption in:
1-10 of 700
Vincent Primiani
7
5,352points to level up
Cybersecurity. The Study Group Guy.

Active 7h ago
Joined Apr 29, 2024
New York, NY
Powered by