Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CISSP Study Group

1.9k members • Free

50 contributions to CISSP Study Group
CISSP Practice Question (Domain 1: Security and Risk Management)
An organization's CISO discovers that a third-party SaaS vendor processing customer PII has been acquired by a foreign company. The acquiring company is headquartered in a jurisdiction with government data access laws that conflict with the organization's regulatory obligations under GDPR. The vendor contract has 18 months remaining. What should the CISO do FIRST? A. Invoke the contract's termination-for-convenience clause and begin immediate vendor transition planning B. Conduct a risk assessment to evaluate the change in data sovereignty exposure and regulatory compliance impact C. Require the vendor to migrate all customer data to data centers located within approved jurisdictions D. Notify the Data Protection Authority and affected customers of the potential cross-border data transfer Come back for the answer tomorrow, or study more now!
0 likes • 17h
A. Invoke the contract's termination-for-convenience clause and begin immediate vendor transition planning ( As clauses for acquiring by foreign company having conflicting regulatory domain in the prevoius contract not mentioned for approprite action, unlateral direct contract termination is not conforming to corporate governance). B. Conduct a risk assessment to evaluate the change in data sovereignty exposure and regulatory compliance impact ( the said course of action is more aligning with security governance with buisness objectives). C. Require the vendor to migrate all customer data to data centers located within approved jurisdictions ( its apprprite steo but later step after 'B' ) D. Notify the Data Protection Authority and affected customers of the potential cross-border data transfer (the action is meant for data breach notofication and not be acceptable under GDPR by DPA / customers).
CISSP Practice Question (Domain 8: Software Development Security)
A development team integrates a generative AI coding assistant that was trained on public repositories. The tool accelerates feature delivery but occasionally references deprecated libraries. Legal warns that AI-generated code may contain license violations or expose proprietary logic if the model was trained on leaked internal code. What should the security manager do FIRST? A. Engage legal counsel to review the AI vendor's training data sources and contractual indemnification clauses B. Implement software composition analysis (SCA) and require all AI-generated code to be digitally signed before commit C. Restrict the AI tool's access to internal repositories and enforce output review through secure-coding peer validation D. Retrain or fine-tune the AI model using only vetted, license-compliant code from approved sources
1 like • 2d
A. Engage legal counsel to review the AI vendor's training data sources and contractual indemnification clauses ( As the matter is of legal nature licese violations - regulatory issue, " Call tha Attorney" for opinion and transfer the risk through indemnity clauses- Governance decision). B. Implement software composition analysis (SCA) and require all AI-generated code to be digitally signed before commit ( it will mitigate risk of known vunalabities and increase integrity of code but will not solve the root cause- operational action). C. Restrict the AI tool's access to internal repositories and enforce output review through secure-coding peer validation ( restiction will effect feature delivery though out review --- is best coding practice). D. Retrain or fine-tune the AI model using only vetted, license-compliant code from approved sources ( it will under mine use of open source repostires for efficient good generation capability of AI model).
CISSP Practice Question (Domain 2: Asset Security)
An organization allows multiple business units to deploy their own AI agents using shared enterprise data lakes. Each unit claims ownership of its AI outputs, while data sources remain centrally managed. A dispute arises after an AI-generated report exposes sensitive correlations between departments. What is the MOST appropriate action to take FIRST? A. Reclassify the AI-generated outputs under the highest data sensitivity level B. Clarify and formally assign data ownership and stewardship for AI-derived assets C. Segregate AI workloads by business unit to prevent cross-correlation D. Implement stronger access controls on the shared data lake Come back for the answer tomorrow, or study more now!
1 like • 3d
A. Reclassify the AI-generated outputs under the highest data sensitivity level ( As the input data source is shared model centrally manged, AI generated out put has no clear classification ). B. Clarify and formally assign data ownership and stewardship for AI-derived assets (as per Governance, ownership of AI derived assets comes first for further classification according to sensitivity level is priority action ). C. Segregate AI workloads by business unit to prevent cross-correlation ( effect business performance and not aligning governance/security with business objectives). D. Implement stronger access controls on the shared data lake ( it will prevent unauthorised access to data lakes ( source data) that is irrelevant measure for AI generated output dispute).
CISSP Practice Question (Domain 1: Security and Risk Management)
An organization deploys an AI system that recommends layoffs and budget cuts based on financial and productivity data. Executives approve its use but do not fully understand its decision logic. The recommendations align with profits but raise ethical and reputational concerns internally. What is the MOST appropriate action for the security leader? A. Require human review of all AI-generated workforce decisions B. Document the risk acceptance and ethical considerations in governance records C. Suspend the AI system until explainability requirements are met D. Conduct a privacy impact assessment focused on employee data Come back for the answer tomorrow, or study more now!
1 like • 6d
A. Require human review of all AI-generated workforce decisions ( Good decsion following recommendations AI governanace that AI under human oversight). B. Document the risk acceptance and ethical considerations in governance records ( As security leader, its applicable for other risk acceptences except ethical concerns where ISC2 canons put some bindings). C. Suspend the AI system until explainability requirements are met ( its not secuirty aligned with busienss as excutive governace desicion cannnot be reversed abruptly). D. Conduct a privacy impact assessment focused on employee data ( lays off not directly rlevent to privacy impact assessment).
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A financial services company needs to share highly sensitive customer transaction data with a third-party analytics provider. The company's legal department mandates that the third-party must be able to perform statistical analysis on the data, but the data must remain encrypted at all times, including while it is being processed by the provider's algorithms to ensure the company never loses control over the plaintext. What is the MOST appropriate cryptographic solution to meet this requirement? A. Symmetric encryption using AES-256 with a managed Key Vault B. Asymmetric encryption using RSA-4096 with Perfect Forward Secrecy C. Homomorphic encryption D. Quantum-resistant cryptography
1 like • 9d
A. Symmetric encryption using AES-256 with a managed Key Vault ( best for data at rest / disk ). B. Asymmetric encryption using RSA-4096 with Perfect Forward Secrecy ( best for data in transit and protection from replay attack). C. Homomorphic encryption ( best for data in use / prcessing ). D. Quantum-resistant cryptography ( generic term best for future alogorithms secure form quantum computing cpability to solve complex mathematical problem basis for asymmetric cryptography).
1-10 of 50
Hassan Na
4
54points to level up
@hassan-hassan-4557
CISSP aspirant, ISC2 CC

Active 10m ago
Joined Dec 7, 2025
Powered by