Activity
Mon
Wed
Fri
Sun
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Memberships

For Him

2 members • Free

The AI/GRC Career Starter

299 members • Free

CISSP Study Group

2k members • Free

CyberMAYnia CAREER

358 members • Free

10 contributions to CISSP Study Group
CISSP Practice Question (Domain 6: Security Assessment and Testing)
Your organization completed a penetration test that found critical vulnerabilities in a payment processing system. The business unit owner wants to delay remediation until after the holiday revenue peak, citing potential downtime. What should you do FIRST? A. Override the business unit and enforce immediate remediation of all critical findings B. Escalate to the risk committee with a temporary compensating controls proposal C. Accept the delay since the business unit owner is the risk owner D. Commission a follow-up penetration test to validate exploit feasibility Come back for the answer tomorrow, orstudy more now!
1 like • Feb 16
B. Escalating to Risk Committee with temp compensating control seems to be the best thing to do FIRST
CISSP Practice Question (Domain 2: Asset Security)
Your organization classifies data into four tiers, but a recent audit reveals that 60% of assets remain unclassified because data owners dispute classification responsibility with IT custodians. What should you do FIRST? A. Default all unclassified assets to the highest classification tier B. Assign IT custodians temporary classification authority to eliminate the backlog C. Clarify data ownership roles and accountability in the classification policy D. Implement automated classification tools to remove the human bottleneck Please share your thinking, I'd really like to know how everyone looks at this very real world scenario. Come back for the answer tomorrow, or study more now!
0 likes • Feb 16
First step is to check /clarify what the policy directs! So I Choose C
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A financial services firm is designing a new system that must meet strict regulatory uptime requirements. The architect proposes a single-cloud provider for simplicity, but the risk team warns of concentration risk. What is the BEST approach? A. Accept single-cloud risk and negotiate enhanced SLAs with the provider B. Require a multi-cloud architecture to eliminate provider dependency C. Evaluate concentration risk against complexity costs and regulatory obligations D. Implement on-premises failover to maintain independence from cloud providers Come back for the answer tomorrow, or study more now!
1 like • Feb 16
Risk assessment seems to be the best approach before we can make risk based decisions on which option to pursue (to accept, mitigate, avoid, or transfer) , so I would choose C as well
CISSP Practice Question (Domain 1: Security and Risk Management)
Your organization is expanding into a country that requires all citizen data to be stored within its borders. The legal team recommends immediate compliance, but the existing cloud architecture uses a single global tenant. What should you do FIRST? A. Negotiate a regulatory exception with the host country's data authority B. Conduct a data sovereignty impact assessment against current architecture C. Migrate all citizen data to an in-country data center immediately D. Update the privacy policy to disclose cross-border data transfers Come back for the answer tomorrow, or study more now!
1 like • Feb 9
As FIRST thing to do, we should understand the the data flow architecture and the impacted users and their data so answer B (Conduct a data sovereignty impact assessment against current architecture) is MOST likely first step
CISSP Practice Question (Domain 1: Security and Risk Management)
A multinational organization is expanding into a region with strict data localization laws while maintaining its global incident response capability. The CISO must balance compliance with operational effectiveness. What is the MOST appropriate first step? A. Deploy regional SOC infrastructure to process security data locally B. Conduct a regulatory impact assessment on cross-border data flows C. Negotiate data transfer agreements with the host country's authority D. Implement encryption for all security telemetry leaving the region Come back for the answer tomorrow, or study more now!
2 likes • Feb 8
MOST appropriate FIRSt step: B. Conduct a regulatory impact assessment on cross-border data flows
1-10 of 10
Gideon Manoharan
2
10points to level up
@gideon-manoharan-1986
GRC tech/Cyber Controls Management. Working for Deloitte internal services. I enable GRC controls onboarding and automating, modernizing GRC processes

Active 10h ago
Joined Jan 29, 2026
Powered by