Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CISSP Study Group

1.9k members • Free

11 contributions to CISSP Study Group
CISSP Practice Question Domain 5 (Identity and Access Management)
An organization recently discovered that a former employee's access credentials were used to exfiltrate sensitive customer data two weeks after their termination. Which of the following controls would have been MOST effective in preventing this incident? A) Implementing multi-factor authentication for all users B) Conducting regular access reviews and timely account deprovisioning C) Deploying a data loss prevention (DLP) solution D) Encrypting all sensitive data at rest Come back for the answer tomorrow, or study more now!
0 likes • 1d
B is appropriate to deal with situation
CISSP Practice Question (Domain 1: Security and Risk Management)
A multinational organization is expanding into a region with strict data localization laws while maintaining its global incident response capability. The CISO must balance compliance with operational effectiveness. What is the MOST appropriate first step? A. Deploy regional SOC infrastructure to process security data locally B. Conduct a regulatory impact assessment on cross-border data flows C. Negotiate data transfer agreements with the host country's authority D. Implement encryption for all security telemetry leaving the region Come back for the answer tomorrow, or study more now!
0 likes • 1d
B
CISSP Practice Question (Domain 1: Security and Risk Management)
Your organization is expanding into a country that requires all citizen data to be stored within its borders. The legal team recommends immediate compliance, but the existing cloud architecture uses a single global tenant. What should you do FIRST? A. Negotiate a regulatory exception with the host country's data authority B. Conduct a data sovereignty impact assessment against current architecture C. Migrate all citizen data to an in-country data center immediately D. Update the privacy policy to disclose cross-border data transfers Come back for the answer tomorrow, or study more now!
1 like • 1d
My answer is B; assessment of current architecture will give insights and action plan
CISSP Practice Question (Domain 8: Software Development Security)
A development team uses an AI-powered coding assistant that suggests code snippets from its training data. The tool recently generated functions containing logic similar to a competitor's proprietary algorithm. What should the security manager do FIRST? A. Conduct a legal review to assess intellectual property infringement risk B. Implement software composition analysis to detect and flag AI-generated code C. Restrict the AI tool's network access and require human review of all outputs D. Retrain the model on the organization's internal codebase only Come back for the answer tomorrow, or study more now!
1 like • 2d
A
CISSP Practice Question (Domain 1: Security and Risk Management)
An organization's CISO discovers that a third-party SaaS vendor processing customer PII has been acquired by a foreign company. The acquiring company is headquartered in a jurisdiction with government data access laws that conflict with the organization's regulatory obligations under GDPR. The vendor contract has 18 months remaining. What should the CISO do FIRST? A. Invoke the contract's termination-for-convenience clause and begin immediate vendor transition planning B. Conduct a risk assessment to evaluate the change in data sovereignty exposure and regulatory compliance impact C. Require the vendor to migrate all customer data to data centers located within approved jurisdictions D. Notify the Data Protection Authority and affected customers of the potential cross-border data transfer Come back for the answer tomorrow, or study more now!
0 likes • 9d
B looks relevant
0 likes • 9d
@Vincent Primiani I am new to group. Where can I see right answer?
1-10 of 11
Gurudatt Kumar
2
14points to level up
@gurudatt-kumar-5649
Cybersecurist

Active 2h ago
Joined Jan 26, 2026
Powered by