Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CISSP Study Group

1.8k members • Free

6 contributions to CISSP Study Group
CISSP Practice Question (Domain 4: Communication & Network Security / Zero Trust Architecture)
An organization adopts a Zero Trust model and removes implicit trust between internal network segments. Shortly after deployment, several business-critical applications experience latency and intermittent access failures. Leadership questions whether the Zero Trust initiative should be rolled back. What should the security architect do FIRST? A. Roll back Zero Trust controls to restore application performance B. Perform a targeted assessment to identify policy enforcement points causing disruption C. Permanently whitelist affected applications to bypass Zero Trust controls D. Escalate the issue to vendors to redesign the Zero Trust architecture
2 likes • 17h
B is resonable option as stringnet policy enforcement point might caused problem
CISSP Practice Question (Domain 2: Asset Security / Data Lifecycle & Retention)
An organization migrating legacy file shares to a cloud collaboration platform discovers that several datasets contain regulated records with no documented retention periods or data owners. The business wants immediate migration to meet a project deadline. What should the security manager do FIRST? A. Migrate the data and address ownership and retention after cutover B. Identify data owners and define retention requirements before migration C. Apply default retention policies to all datasets to avoid delay D. Escalate the issue to legal and halt the migration indefinitely
3 likes • 2d
B is very close to principles of GRC as without assigning ownership, classification is not possible for leading to implementation of respective secuirty controls and rentention policy.
CISSP Practice Question (Domain 3: Security Architecture & Engineering / Cryptographic Key Management)
A global enterprise is transitioning from long-term symmetric encryption keys to an automated key rotation system using hardware security modules (HSMs). During the rollout, application owners express concern that frequent rotation may disrupt legacy integrations and availability. What should the security architect do FIRST? A. Enforce the new key-rotation policy across all systems immediately B. Perform a risk assessment to evaluate availability impact and integration dependencies C. Allow legacy systems to retain long-term keys indefinitely D. Delay implementation until all applications are modernized
4 likes • 4d
A. Enforce the new key-rotation policy across all systems immediately (its not wise mind set, without considering pros& cons and against change management) B. Perform a risk assessment to evaluate availability impact and integration dependencies ( risk assessment according to change management ) C. Allow legacy systems to retain long-term keys indefinitely ( its not inline with tech advancement for improving security ) D. Delay implementation until all applications are modernised (step by step change / evolution is key to success, leaving system vulnerable is not security mindset)
CISSP Practice Question (Domain 6: Security Assessment & Testing / Continuous Monitoring)
An organization replaces periodic vulnerability scans with a continuous exposure-management platform that automatically adjusts risk scores based on real-time threat intelligence. During an internal audit, leadership asks whether this approach still satisfies regulatory expectations for formal security assessments. What should the security manager do FIRST to address this concern? A. Map continuous monitoring outputs to regulatory assessment requirements B. Resume scheduled vulnerability scans to avoid audit findings C. Request written approval from regulators for the new approach D. Disable automated risk scoring and rely on static assessments
3 likes • 6d
A. Map continuous monitoring outputs to regulatory assessment requirements ( seems viable option which moving towards what regulator wants in relation to his expections ). B. Resume scheduled vulnerability scans to avoid audit findings ( retrograding action from technological advancement)- contineous monitoring ( zero trust )). snapshot of contious monitoring at any point will suffice periodic scan. C. Request written approval from regulators for the new approach ( regulator approval not always mandatory until explicitly specified as mostly regulator desire output not adopted prcoesses ). D. Disable automated risk scoring and rely on static assessments ( again discourging technogical advacement and automation ).
CISSP Practice Question (Domain 7: Security Operations / Supply Chain Risk)
An enterprise discovers that a widely used third-party monitoring agent embedded in multiple production servers has begun making undocumented outbound connections to an IP range controlled by a subcontractor the enterprise has never engaged. The agent is critical for operational visibility, and disabling it would blind several detection controls. No malicious activity has been confirmed, but threat intelligence reports suggest recent supply chain compromises involving similar agents. What should the security manager do FIRST? A. Immediately isolate all hosts running the agent from the network B. Conduct a rapid supplier risk reassessment and verify the legitimacy of the subcontractor relationship C. Disable the agent across production to eliminate potential exfiltration D. Escalate directly to regulators due to potential third-party data exposure
1 like • 8d
A. Immediately isolate all hosts running the agent from the network ( it will disrupt critical operations) B. Conduct a rapid supplier risk reassessment and verify the legitimacy of the subcontractor relationship ( sane option as no malacious activity established yet) C. Disable the agent across production to eliminate potential exfiltration ( Its running important for detective controls operation) D. Escalate directly to regulators due to potential third-party data exposure ( without establishing incident and exposure, approaching regulator is not justifed)
1-6 of 6
Hassan Hassan
2
4points to level up
@hassan-hassan-4557
CISSP aspirant

Active 16h ago
Joined Dec 7, 2025
Powered by