Activity
Mon
Wed
Fri
Sun
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Owned by Vincent

CISSP Study Group

2k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

OpenAI Study Group

1 member • Free

Share resources, get advice, and connect with peers studying for OpenAI certifications! Join our Study Group and meet fellow professionals today!

Memberships

CyberMAYnia CAREER

350 members • Free

Skoolers

189.7k members • Free

749 contributions to CISSP Study Group
CISSP Practice Question (Domain 4: Communication and Network Security)
A remote workforce uses split-tunnel VPN to reduce bandwidth costs. The security team discovers employees are accessing sanctioned SaaS applications directly from home networks, bypassing the corporate proxy and DLP controls. Management values the current performance gains. What is the MOST appropriate recommendation? A. Switch to full-tunnel VPN to route all traffic through corporate controls B. Deploy a cloud-based secure web gateway to enforce policy at the endpoint C. Accept the risk and document the DLP gap as a known exception D. Restrict SaaS access to corporate-managed devices only Come back for the answer tomorrow, or study more now!
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
Your organization is migrating legacy on-premises applications to a multi-cloud environment. The security team discovers that several applications use hardcoded service account credentials that cannot be easily refactored before the migration deadline. Business leadership refuses to delay the timeline. What is the BEST approach? A. Migrate as planned and prioritize credential refactoring in the next sprint B. Implement secrets management and network segmentation around the vulnerable applications C. Present the risk formally to leadership with compensating control options and timeline impacts D. Reject the migration for applications with hardcoded credentials until remediation is complete Come back for the answer tomorrow, or study more now!
2 likes • 2d
@Dj Sahoo Correct Answer: C. Present the risk formally to leadership with compensating control options and timeline impacts Explanation (CISSP logic): Leadership already made a business decision to hold the timeline. Security's job now is to ensure that decision is an informed one. Hardcoded credentials in a multi-cloud environment dramatically expand the blast radius if compromised, but unilaterally blocking the migration or silently migrating known vulnerabilities are both governance failures. The CISSP approach is to formally communicate the risk, propose compensating controls, and let leadership decide with full visibility. This is risk communication, not risk avoidance. Breakdown: A. Migrate and fix later - This is "hope as a strategy." You're knowingly pushing vulnerable applications into a broader attack surface with no documented risk acceptance. If a breach occurs, there's no paper trail showing leadership was informed. B. Secrets management and segmentation - Strong technical answer and likely part of the compensating control proposal, but implementing controls without formal risk communication skips governance. Who authorized the cost, scope, and residual risk? C. ✅ Correct. Formalizes the risk, gives leadership options, and preserves accountability. Whether they accept, mitigate, or adjust the timeline, the decision is documented and owned. D. Reject the migration - Security doesn't have veto authority over business decisions. Blocking a leadership-approved initiative without escalation is overstepping your role. Think like a manager: When the business says "go" and security sees danger, your job isn't to block the road. It's to put up the warning signs and make sure the driver knows exactly what's ahead.
CISSP Practice Question (Domain 1: Security and Risk Management)
During a third-party risk assessment, you discover a critical SaaS vendor stores customer data in a jurisdiction that conflicts with your organization's data residency requirements. The vendor scores well on every other security benchmark. The contract renewal deadline is in two weeks. What should you do FIRST? A. Require the vendor to migrate data to a compliant region before renewal B. Engage legal counsel to assess regulatory exposure and contractual options C. Renew the contract with an addendum requiring future data residency compliance D. Begin evaluating alternative vendors that meet data residency requirements Come back for the answer tomorrow, or study more now!
1 like • 3d
@Dj Sahoo Correct Answer: B. Engage legal counsel to assess regulatory exposure and contractual options Explanation (CISSP logic): Data sovereignty conflicts are legal and regulatory problems before they are technical or procurement problems. You have a two-week deadline, a vendor you otherwise trust, and a jurisdictional conflict that could carry fines, enforcement actions, or contractual liability. Before you demand migration, renew with conditions, or start a vendor search, you need to understand what your actual exposure is. Legal counsel determines whether this is a hard regulatory violation or a manageable contractual gap. That assessment drives every decision that follows. Breakdown: A. Require data migration before renewal - Sounds decisive, but two weeks is almost certainly not enough time for a data migration. You're also making demands without understanding whether the contract gives you leverage to enforce them. B. ✅ Correct. Legal defines the risk landscape. Are you in violation today? What are the penalties? Does the current contract have data residency clauses you can enforce? You can't make an informed decision without these answers. C. Renew with a compliance addendum - This kicks the can down the road. You're signing a contract while knowingly in a potentially non-compliant state. If regulators come knocking, "we added an addendum" is not a strong defense. D. Evaluate alternative vendors - Prudent long-term, but not the first step. Starting a vendor search before understanding your legal position wastes time and may be unnecessary if the situation is contractually resolvable. Think like a manager: When proprietary data crosses a border, your first call is to legal, not to engineering or procurement. Understand your exposure before you act on it.
0 likes • 4d
Altonnn!!! That's alright man. We are here for ya.
CISSP Practice Question (Domain 8: Software Development Security)
A development team integrates a third-party open-source library that processes customer PII. Six months later, a critical vulnerability is disclosed in that library. The vendor has not released a patch. Business stakeholders resist removing the library because it powers a revenue-generating feature. What is the MOST appropriate action? A. Implement compensating controls around the vulnerable component and document the accepted risk B. Fork the library and develop an internal patch C. Escalate to the risk owner for a formal risk acceptance decision D. Immediately remove the library and disable the affected feature Come back for the answer tomorrow, or study more now!
0 likes • 4d
@Ivo Mulders Correct Answer: C. Escalate to the risk owner for a formal risk acceptance decision Explanation (CISSP logic): This is a textbook governance-versus-engineering trap. You have a known vulnerability, no vendor patch, and business pressure to keep the feature running. The CISSP answer is never for the security team to unilaterally accept risk or make business continuity decisions. That authority belongs to the risk owner. Domain 1 and Domain 8 intersect here: the risk owner must weigh the exposure against business value and formally decide whether to accept, mitigate, or avoid. Everything else flows from that decision. Breakdown: A. Compensating controls and document risk - Sounds mature, but who authorized accepting this risk? The security team is making a business decision without the authority to do so. Compensating controls may follow, but only after the risk owner decides. B. Fork and patch internally - Technically proactive, but introduces maintenance burden, potential licensing issues, and still skips the governance step. You're assuming the decision has already been made. C. ✅ Correct. The risk owner has the authority and accountability to make this call. They may choose compensating controls, removal, or formal acceptance, but it's their decision to make. D. Remove the library immediately - Respects security but ignores business impact. Unilaterally killing a revenue feature without executive sign-off is a career-ending move and a governance failure. Think like a manager: Security identifies risk. The risk owner decides what to do about it. Never confuse advisory authority with decision authority.
1-10 of 749
Vincent Primiani
7
5,147points to level up
Cybersecurity. The Study Group Guy.

Active 2d ago
Joined Apr 29, 2024
New York, NY
Powered by