Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

1.7k members • Free

15 contributions to CISSP Study Group
CISSP Practice Question – Investigations & Forensics
During an internal investigation of suspected data theft, the incident response team collects a laptop from an employee’s desk. To preserve admissibility of evidence, which of the following is the MOST important step to take FIRST? A. Create a forensic image of the laptop using a write blocker. B. Power down the laptop to prevent further tampering. C. Document the time, date, and individuals involved in seizing the device. D. Secure the laptop in a locked evidence cabinet.
1 like • Oct 1
c
CISSP Practice Question – Security & Risk Management (Ethics)
While performing a security assessment for a client, you discover confidential information that suggests the client’s employees are engaging in activity that may be illegal but is unrelated to the scope of your engagement. According to the ISC2 Code of Ethics, what is the BEST action for you to take? A. Report the activity directly to law enforcement. B. Inform your client’s senior management about the findings. C. Document the evidence and keep it in case it’s needed later. D. Ignore the activity since it is outside the scope of your contract.
0 likes • Sep 24
B
Practice Question – Security Models
You are designing a system for a law firm that represents multiple competing corporations. The system must: - Prevent lawyers from accessing case files of competing clients - Ensure paralegals can enter data but only senior attorneys can approve filings - Maintain confidentiality of client records Which combination of models is most relevant here? A. Bell–LaPadula and Biba B. Clark–Wilson and Brewer–Nash C. Bell–LaPadula and Clark–Wilson D. Brewer–Nash and Biba
0 likes • Sep 24
B -
Practice Question
An internal audit for an organization recently identified malicious actions by a user account. Upon further investigation, it was determined the offending user account was used by multiple people at multiple locations simultaneously for various services and applications. What is the BEST method to prevent this problem in the future? A. Ensure the security information and event management (SIEM) is set to alert. B. Inform users only one user should be using the account at a time. C. Ensure each user has their own unique account. D. Allow several users to share a generic account.
0 likes • Sep 22
C - alomg with this there should be a MFA in place
CISSP Practice Question – Software Development Security
A development team is adopting a secure software development lifecycle (SDLC). The security manager wants to ensure that vulnerabilities are identified before code is executed, but also wants to minimize cost and disruption to developers. Which of the following activities BEST meets this requirement? A. Static application security testing (SAST) B. Dynamic application security testing (DAST) C. Fuzz testing D. Penetration testing
0 likes • Sep 19
A
1-10 of 15
Devaraju Namala
2
15points to level up
@devaraju-namala-9479
ISO 27001 Lead Auditor | 18+ Years of Experience in ISO 27001, ISO 9001, ISO 20000, HIPAA, PCIDSS, NIST, SOC and ITIL.

Active 58d ago
Joined Jul 25, 2025
Powered by