Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CISSP Study Group

1.9k members • Free

61 contributions to CISSP Study Group
CISSP Practice Question (Domain 5: Identity and Access Management)
A newly acquired subsidiary uses shared administrator accounts for critical infrastructure management. The integration team wants to immediately enforce individual accounts, but operations warns this could disrupt 24/7 production systems. What is the MOST appropriate next step? A. Implement privileged access management with session recording for shared accounts B. Require individual accounts with emergency break-glass procedures for continuity C. Assess the shared account inventory and map dependencies before enforcing changes D. Accept the risk temporarily and schedule individual account rollout for next quarter Come back for the answer tomorrow, or study more now!
0 likes • 2h
A. Implement privileged access management with session recording for shared accounts (Applying PAM with recording is good IAM alongwith monitoing but change impact assessment before chnage is important step of change management). B. Require individual accounts with emergency break-glass procedures for continuity ( Individual accounts with emergency privlege escalation are technically feasible and commonly implemented but considered high risked and require contineous monitoring and strict access control). C. Assess the shared account inventory and map dependencies before enforcing changes ( sane option to assess imact of change before proceeding with further actions). D. Accept the risk temporarily and schedule individual account rollout for next quarter ( continuation of shared admin account for crticial infrastructure managment is contrary to secuirty priciples and best practices though arbitrary risk acceptance is discretion of higher management). Assess → Analyze → Plan/Design → Approve → Implement → Monitor → Improve
CISSP Study Group
I have completed 51 quiz & discussion session of this study group, it was an amazing experience of learning and shaping knowledge and mindset duly required by CISSP. My two month learning on this group were equal to my last one year studying alone.
0 likes • 3h
No doubt, thank you for providing this excellent opportunity
CISSP Practice Question (Domain 1: Security and Risk Management)
Your organization is expanding into a country that requires all citizen data to be stored within its borders. The legal team recommends immediate compliance, but the existing cloud architecture uses a single global tenant. What should you do FIRST? A. Negotiate a regulatory exception with the host country's data authority B. Conduct a data sovereignty impact assessment against current architecture C. Migrate all citizen data to an in-country data center immediately D. Update the privacy policy to disclose cross-border data transfers Come back for the answer tomorrow, or study more now!
1 like • 1d
A. Negotiate a regulatory exception with the host country's data authority ( after 'B' with assurance of data security by measures through strong encryption ( data confidentiality & crypto shredding) due to single global tenant constraint but still lacking compliance). B. Conduct a data sovereignty impact assessment against current architecture ( Governance level decision first to balance legal compliance and business need). C. Migrate all citizen data to an in-country data center immediately ( technically and adminstratively not feasible without completition of prior actions - immediate actions without formal prcocess are risky). D. Update the privacy policy to disclose cross-border data transfers ( this option comes after B and A if host country's data authority permits,however, dislosure is not equivalent of compliance ).
CISSP Practice Question (Domain 8: Software Development Security)
A development team uses an AI-powered coding assistant that suggests code snippets from its training data. The tool recently generated functions containing logic similar to a competitor's proprietary algorithm. What should the security manager do FIRST? A. Conduct a legal review to assess intellectual property infringement risk B. Implement software composition analysis to detect and flag AI-generated code C. Restrict the AI tool's network access and require human review of all outputs D. Retrain the model on the organization's internal codebase only Come back for the answer tomorrow, or study more now!
1 like • 2d
A. Conduct a legal review to assess intellectual property infringement risk ( similarity to a competitor's proprietary algorithm can expose the said risk, risk assessment is sane option to proceed further with C or D- Governance). B. Implement software composition analysis to detect and flag AI-generated code ( soft ware composition analysis is effective for finding root cause but it will come after risk assessment out come- detective/ operational decision). C. Restrict the AI tool's network access and require human review of all outputs ( restriction ( risk treatment -avoidance) prior to A (risk assessment) is contrary to security governance alignment with business objectives though human review of AI is important - AI Governance). D. Retrain the model on the organisation's internal code base only ( undermine performance of model without accessing external code repositories / libraries). Identify → Assess (legal/risk) → Decide → Treat/Mitigate
CISSP Practice question
Dorian is a security professional for a healthcare corporation.Due to HIPAA (Health Insurance Portability and Accountability Act) regulations, Dorian must find methods to protect any PHI (public health information). Which security approach will BEST minimize PHI loss from a data breach?
Poll
20 members have voted
0 likes • 3d
Loss of encrypted data ( key and encryption algorithm are strong and secure) is not considered as breach ( exposure of confidentiality) and not apllicable to breach notification (GDPR- safe harbour). Therefore encryption is the best choice but E2EE is only effective for data in transit ehich creates a little ambiguity. Moreover, if encrption is not in the given options, then Data Collection Base Line (minmum collection) is effective measure will BEST minimize PHI loss from a data breach. That is why CISSP want to focus on question in hand rahter establishing resemblance with previous question as a minimal change in question wording or answer options will chnage the context entirly like Diffusion in encryption influence of single plaintext bit change across many ciphertext bits.
1-10 of 61
Hassan Na
4
33points to level up
@hassan-hassan-4557
CISSP aspirant, ISC2 CC

Active 2h ago
Joined Dec 7, 2025
Powered by