Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CyberMAYnia Club

57 members • Free

CISSP Study Group

1.7k members • Free

13 contributions to CISSP Study Group
CISSP Practice Question , Security Operations / Legal Investigations (Ethics, Law, and Evidence)
A company’s internal investigation uncovers evidence suggesting that an employee may have stolen trade secrets and transmitted them to a competitor. The security team’s forensic analyst, who is not law enforcement, uses packet capture tools to monitor the suspect’s outbound traffic in real time to confirm the leak. The analyst captures the data and presents it to management, who plan to terminate the employee immediately. From a CISSP and legal standpoint, what is the MOST significant concern with how this evidence was obtained? A. The analyst may have violated wiretapping and privacy laws by monitoring live network traffic without proper authorization. B. The analyst exceeded professional scope by performing forensics on corporate assets without a court order. C. The evidence is invalid because the analyst did not use a certified forensic tool for packet capture. D. The company should have notified law enforcement before beginning the internal investigation.
0 likes • Nov 4
A
CISSP Practice Question – Security Architecture & Engineering (Information Flow Models)
A defense contractor is building a system that will store design data for classified weapons. Engineers must ensure that a user cleared for “Secret” cannot modify “Top Secret” design files, and that data from lower classifications can never compromise higher-level data integrity. Which information flow model BEST satisfies these requirements? A. Bell–LaPadula Model B. Biba Integrity Model C. Clark–Wilson Model D. Brewer–Nash (Chinese Wall) Model
0 likes • Nov 4
B
CISSP Practice Question – Legal & Regulatory Compliance (Data Privacy)
A U.S.–based company provides cloud storage services to European customers. Personal data from EU citizens is processed and stored on servers located in the United States. Under the EU General Data Protection Regulation (GDPR), what is the PRIMARY legal requirement before transferring this data outside the EU? A. Encrypt the data before transmitting it to ensure confidentiality in transit. B. Notify EU supervisory authorities within 72 hours of each cross-border data transfer. C. Establish an approved transfer mechanism such as Standard Contractual Clauses or Binding Corporate Rules. D. Obtain the explicit consent of every data subject prior to data transfer.
0 likes • Oct 16
C
CISSP Practice Question – Control Selection & Residual Risk
A recent assessment identified that a key web application handling payment data has several high-severity vulnerabilities. Management approved funding to implement a web application firewall (WAF) and continuous code scanning as compensating controls. After both controls are deployed and verified, the residual risk remains above the organization’s formally documented risk appetite. What should the information security manager recommend NEXT? A. Accept the residual risk since reasonable controls have been implemented. B. Transfer the residual risk through a cyber-insurance policy. C. Escalate the residual risk to senior management for a risk acceptance decision. D. Implement additional detective controls to reduce exposure further.
0 likes • Oct 13
C
Who's coming to hang with May Brooks again on Sat? 👀 (cryptography)
Find us here May has prepared a 20 to 30 minute session on cryptography for us!
Poll
36 members have voted
Who's coming to hang with May Brooks again on Sat? 👀 (cryptography)
1 like • Oct 10
I passed the CISSP exam
1 like • Oct 11
@Brandis MatthewsThank You
1-10 of 13
Reggie Johnson
2
15points to level up
@reginald-johnson-jr-6201
Beginner trying enhance IT technical skills

Active 20d ago
Joined Apr 3, 2025
Powered by