Activity
Mon
Wed
Fri
Sun
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Memberships

CyberMAYnia CAREER

349 members • Free

CISSP Study Group

2k members • Free

99 contributions to CISSP Study Group
CISSP Practice Question (Domain 4: Communication and Network Security)
A remote workforce uses split-tunnel VPN to reduce bandwidth costs. The security team discovers employees are accessing sanctioned SaaS applications directly from home networks, bypassing the corporate proxy and DLP controls. Management values the current performance gains. What is the MOST appropriate recommendation? A. Switch to full-tunnel VPN to route all traffic through corporate controls B. Deploy a cloud-based secure web gateway to enforce policy at the endpoint C. Accept the risk and document the DLP gap as a known exception D. Restrict SaaS access to corporate-managed devices only Come back for the answer tomorrow, or study more now!
0 likes • 1d
A. Switch to full-tunnel VPN to route all traffic through corporate controls ( As the split tunnel VPN was selected to reduce cost as business decision, full tunnel VPN will increase cost which will causing diversion of funds from business to secuirty violating the principle of resonable security ). B. Deploy a cloud-based secure web gateway to enforce policy at the endpoint ( best recommendation balancing security, performace and cost for SAAS remote access). C. Accept the risk and document the DLP gap as a known exception ( Security lead should suggest the appopriate cost effective balanced solution for security and business rather than straight away acceptance of risk ). D. Restrict SaaS access to corporate-managed devices only (DLP and proxy controls are still bypassed even on managed devices. Although the leadership can restrict but it has business impact and will not eradicate the root cause of the problem).
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
Your organization is migrating legacy on-premises applications to a multi-cloud environment. The security team discovers that several applications use hardcoded service account credentials that cannot be easily refactored before the migration deadline. Business leadership refuses to delay the timeline. What is the BEST approach? A. Migrate as planned and prioritize credential refactoring in the next sprint B. Implement secrets management and network segmentation around the vulnerable applications C. Present the risk formally to leadership with compensating control options and timeline impacts D. Reject the migration for applications with hardcoded credentials until remediation is complete Come back for the answer tomorrow, or study more now!
1 like • 2d
A. Migrate as planned and prioritize credential refactoring in the next sprint (As the Business leadership refuses to delay the timeline , without formal risk acceptence by them and you being security consultant / advisor suggesting remediation measures, blind migration is not asvisable). B. Implement secrets management and network segmentation around the vulnerable applications (Compensating are implemented sometimes as weak, temporary stopgaps rather than robust alternatives. regulatory frameworks take them as a last resort, these controls are ocassionaly ineffective when they fail to meet the "rigor and intent" of the primary controls). C. Present the risk formally to leadership with compensating control options and timeline impacts (Keeping above explanation of option 'B' in view, option 'C' is the best aligned with secuirty governance as business enabler). D. Reject the migration for applications with hardcoded credentials until remediation is complete ( overly rigid approach is business unfriendly action without the formal risk acceptence or otherwise by the leadership who is ultimate risk owner, moreover, remediation is not immidiate due to not easy refactoring as mentioned in the scenario ).
0 likes • 3d
🚫 Deterrence Discourages unauthorized actions before they happen. Examples: Warning signs, visible CCTV, security guards, perimeter fencing. šŸ”’ Denial Prevents unauthorized access entirely. Examples: Locked doors, biometric access, turnstiles, security barriers. šŸ‘ļø Detection Identifies suspicious or unauthorized activity when prevention fails. Examples: Motion sensors, IDS/IPS, alarms, SIEM alerts. ā³ Delay Slows attackers down to give responders time to act. Examples: Mantraps, reinforced doors, security glass, layered locks. šŸ” Determine Analyzes what is happening, how serious it is, and what’s impacted. Examples: SOC analysts reviewing logs, camera feeds, and alerts. ⚔ Decide Triggers the right response based on the assessment. Examples: Incident response teams isolating systems, escalating alerts, or engaging law enforcement
0 likes • 3d
contrary to above 6 D's, The 5 D’s of physical security Deter, Detect, Deny, Delay, and Defend is not conforming to CBK ?
CISSP Practice Question (Domain 1: Security and Risk Management)
During a third-party risk assessment, you discover a critical SaaS vendor stores customer data in a jurisdiction that conflicts with your organization's data residency requirements. The vendor scores well on every other security benchmark. The contract renewal deadline is in two weeks. What should you do FIRST? A. Require the vendor to migrate data to a compliant region before renewal B. Engage legal counsel to assess regulatory exposure and contractual options C. Renew the contract with an addendum requiring future data residency compliance D. Begin evaluating alternative vendors that meet data residency requirements Come back for the answer tomorrow, or study more now!
1 like • 3d
A. Require the vendor to migrate data to a compliant region before renewal ( best suggestion for continued operation / renewal of imminant expiring contract, however, it requires contract review as mentioned in option 'B'). B. Engage legal counsel to assess regulatory exposure and contractual options ( For contractual and regulatory matters falling in legal domain, "call the attorney" is the best option before proceed further (option A/C) as per GRC). C. Renew the contract with an addendum requiring future data residency compliance ( Renewal of the contract depends on outcome of option 'B' either remediation or termination). D. Begin evaluating alternative vendors that meet data residency requirements ( this option also implementable in case of outcome of option 'B' if renewal of contract with previous contractor is not recommended following failing to comply with data residency requirements).
Passed CCSP @ 100 Questions on 3/10/26 (cissp.app helped!)
Hi All, I used this group heavily for my CISSP studying last year. This year I studied for the CCSP so I did not participate in the group. However, I used the https://cissp.app/ app in the last week for practice questions and the mock exam feature. It is excellent! The mock exam was the hardest and most realistic of all the practices exam I took for the CCSP. It is adaptive based on your responses and has similar style to the real exam where you can't make sense of the question or answers until rereading a few times. I highly recommend it!
2 likes • 4d
congrats
1-10 of 99
Hassan Na
5
335points to level up
@hassan-hassan-4557
CISSP aspirant, ISC2 CC

Active 2h ago
Joined Dec 7, 2025
Powered by