Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
What is this?
Less
More

Memberships

CyberMAYnia CAREER

439 members • Free

CISSP Study Group

2.1k members • Free

147 contributions to CISSP Study Group
CISSP Practice Question (Domain 8: Software Development Security)
A development team adopts a CI/CD pipeline that auto-deploys to production upon passing unit tests. Security testing currently runs weekly in a separate environment. A recent release introduced a SQL injection flaw that reached production. As the application security lead, what is the BEST corrective action? A. Block all deployments until weekly security testing completes B. Integrate SAST and dependency scanning as gating checks within the pipeline C. Require manual security review before each production release D. Shift security testing to a post-deployment runtime monitoring tool Come back for the answer tomorrow, or study more now!
1 like • 9h
A. Block all deployments until weekly security testing completes ( development blockage is not aligned security with business principle, contineous security integration from inception instead of weekly is far better choice like 'B'). B. Integrate SAST and dependency scanning as gating checks within the pipeline ( best corrective action of security integration as preventive control into pipe line for identifying flaws early aligned with DevSecOps, contineous integration of secuirty and automated gating). C. Require manual security review before each production release (Manual reviews are slower, less scalable, and inconsistent compared to automated integrated security controls in CI/CD, also very late and costly option before pruction release contradicting inclusion od security from begining). D. Shift security testing to a post-deployment runtime monitoring tool ( Also violating the shift left policy for early and cost effective security inclusion).
CISSP Practice Question (Domain 6: Security Assessment and Testing)
An internal audit reveals that quarterly vulnerability scans are completed on schedule, but 40% of critical findings remain unremediated past SLA. The vulnerability management team reports the metrics as "green" because scans were performed. As the CISO, what is the BEST corrective action? A. Reduce scan frequency until remediation capacity catches up B. Redefine the program metrics to measure remediation outcomes, not scan activity C. Escalate overdue findings directly to system owners' executives D. Outsource remediation to a managed security service provider Come back for the answer tomorrow, or study more now!
2 likes • 2d
A. Reduce scan frequency until remediation capacity catches up (Reduce scan frequency until remediation capacity catches up is generally a poor security decision because it increases Mean Time to Detect (MTTD) vulnerabilities and misconfigurations). B. Redefine the program metrics to measure remediation outcomes, not scan activity (As 40% of critical findings remain unremediated which make the detection futile without remediation, therefore redefining the metrics is the best corrective action). C. Escalate overdue findings directly to system owners' executives ( such escalation is not aligned with security governance and will not solve the root cause problem). D. Outsource remediation to a managed security service provider ( Outsourcing remediation changes the delivery model but does not fix measurement, accountability, or risk governance).
Passed the CISSP
I passed the CISSP yesterday. It has been an immense journey and this community has been instrumental and has been great to collaborate and I will continue to do so. You will never feel 100% ready to take this exam, you just have to go for it! I used official study materials to prepare and this community for Q&A which I believe is a great preparation source. Keep pushing, you will get there all that hard work will pay off.
2 likes • 3d
congrats
Question: Domain 1 (Security and Risk Management)
A multinational organization is migrating its data to a third-party cloud provider. The Chief Information Security Officer (CISO) is concerned about maintaining compliance with various international privacy regulations. What is the BEST way to ensure the cloud provider meets the organization’s security requirements? - A. Conduct a point-in-time vulnerability scan of the provider’s infrastructure. - B. Include "right-to-audit" clauses and Require Service Level Agreements (SLAs). - C. Review the provider’s SOC 2 Type II report and audit results. - D. Implement a Cloud Access Security Broker (CASB) to monitor traffic.
1 like • Mar 21
A. Conduct a point-in-time vulnerability scan of the provider’s infrastructure ( Its analogous to SOC 2 Type I report which will not fullfil the future compliance requirement as not cpmprehensive as SOC 2 Type II). - B. Include "right-to-audit" clauses and Require Service Level Agreements (good option for maintaining compliance by inclusion of corporate bindiing through clause and formal legal document as compliance is responsibility of the organization, however, it is complimentary requirement as necessary for governance and continued assurance, but less effecitve to ensure the provider currently meets requirements). - C. Review the provider’s SOC 2 Type II report and audit results ( best for demonstrating security posture assurrance for last 6-12 months and a stanadard report having wide accepatbility for excercise corporate and legal binding to the 3rd party for compliance). - D. Implement a Cloud Access Security Broker (CASB) to monitor traffic ( best practice for security mointoring as futurisitc step but not come before option 'C').
0 likes • 4d
Here I slightly prefer B over C. - B implies continuous monitoring , due diligence + due care and contractual enforcement through SLA - C (even if is a Type 2) the question say "reviewing", so something in the past (and not enforceable in future), The question asks for "maintaining compliance" , this make me think of continuous measures.
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A vendor proposes a new SaaS platform that processes regulated customer data. Procurement wants to sign by quarter-end, and the vendor's SOC 2 Type II report is six months old. As the security architect, what is the MOST appropriate next step? A. Accept the SOC 2 report and proceed with contract execution B. Require the vendor to complete your standard security questionnaire C. Perform a risk assessment mapped to your control requirements D. Demand a fresh penetration test before signing Come back for the answer tomorrow, or study more now!
1 like • 4d
C
2 likes • 4d
A. Accept the SOC 2 report and proceed with contract execution ( Not appropriate without risk assessment first option 'C' as the SOC 2 Type II report is 6 month old in the rapidly evolving threat land scape). B. Require the vendor to complete your standard security questionnaire (questionnaire may support the assessment process but does not replace a formal risk assessment). C. Perform a risk assessment mapped to your control requirements ( most appropriate next step as secuirty architect to compare old report with your current control requirement aligned with goverance priority over technical control). D. Demand a fresh penetration test before signing ( PT provide point in time specific secuity posture rather over a time span over 6 to 12 months of SoC 2 Type II).
1-10 of 147
Hassan Na
5
276points to level up
@hassan-hassan-4557
CISSP aspirant, ISC2 CC

Active 9h ago
Joined Dec 7, 2025
Powered by