Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
What is this?
Less
More

Memberships

CyberMAYnia CAREER

417 members • Free

CISSP Study Group

2.1k members • Free

140 contributions to CISSP Study Group
CISSP Practice Question (Domain 2: Asset Security)
A business unit requests permanent retention of all customer transaction records "in case we ever need them." Legal has not issued a hold, and the current retention schedule requires deletion after seven years. As the data owner's advisor, what is the BEST response? A. Honor the request since longer retention reduces legal discovery risk B. Enforce the existing retention schedule and require a formal exception with risk acceptance C. Migrate the records to cold storage to balance cost and accessibility D. Defer to Legal before taking any action on the records Come back for the answer tomorrow, or study more now!
0 likes • 8h
A. Honor the request since longer retention reduces legal discovery risk ( indefinate rentention is not supported by data life cycle governance and increases legal discovery risk rahter decreasing it). B. Enforce the existing retention schedule and require a formal exception with risk acceptance ( current retention shedule i.e. 7 yrs and extention in retention period subject to risk management is the best response). C. Migrate the records to cold storage to balance cost and accessibility ( cost of rentention relevent to data retention and its balancing with business requirement or regulation is somehow effect data retention policy, however, accessbility is secondary operational factor - issue is policy compliance, not cost optimization). D. Defer to Legal before taking any action on the records ( it is inappropriate as legal already has not issue hold and B has definded risk managment which includes regulatory/ legal compliance).
CISSP Passed
Hi everyone, I’m excited to share that I’ve provisionally passed the CISSP CAT exam today! It’s a challenging journey, but it is absolutely worth it in the end. Huge respect to everyone in this group. If you’re still on the journey, keep pushing. You will get there. Here’s what worked for me: I relied heavily on the official ISC2 5 day boot camp and the e textbook that comes with the training. That combination helped me build a solid foundation and stay focused on what matters. One key mindset shift that really helped during the exam was to trust the process and not panic. Take your time with each question, really try to understand what is being asked, and focus on what they are actually looking for before choosing your answer. Note:The ISC2 CISSP Official Study Guide and Practice Tests Bundle (Sybex) is still essential reading and a great resource to reinforce your understanding. Wishing you all success. You’ve got this.
0 likes • 20h
Congratulations @Hamra Ibrahim Smaila
CISSP Practice Question (Domain 4: Communication and Network Security)
Your organization is migrating critical workloads to a hybrid cloud. The network team proposes extending the existing flat internal VLAN into the cloud VPC to simplify routing and accelerate the cutover. As the security architect, what is the BEST response? A. Approve, provided IPsec tunnels encrypt all inter-site traffic B. Require micro segmentation aligned to a Zero Trust reference architecture C. Mandate east-west IDS sensors before the migration begins D. Defer until a cloud access security broker (CASB) is deployed Come back for the answer tomorrow, or study more now!
0 likes • 3d
A. Approve, provided IPsec tunnels encrypt all inter-site traffic ( does not solve lateral movement or segmentation issues , not aligned with the principle of layered approach & segmentation and least privilege). B. Require micro segmentation aligned to a Zero Trust reference architecture (In a hybrid cloud model, it is most effective when used as part of a layered approach, combined with ZTNA). C. Mandate east-west IDS sensors before the migration begins (focus on detection before prevention is not supportable by technical governance, prefers fixing design flaws over adding monitoring).- fix the architecture before adding tools). D. Defer until a cloud access security broker (CASB) is deployed (In a hybrid cloud model, CASB useful when used as part of a layered approach, combined with IAM / Zero Trust architecture, however, deferring depending on only one factor is not business enablement)
CISSP Practice Question (Domain 3: Security Architecture - AI/ML Systems)
Your firm is procuring a third-party LLM to summarize client contracts containing privileged legal data. The vendor's standard agreement permits using customer inputs to improve their model. What should the security architect recommend FIRST? A. Negotiate a contract addendum prohibiting input use for model training B. Conduct a data flow and risk assessment to classify exposure boundaries C. Require the vendor to deploy a tenant-isolated model instance D. Implement DLP controls to redact privileged content before submission Come back for the answer tomorrow, or study more now!
0 likes • 6d
B
1 like • 6d
A. Negotiate a contract addendum prohibiting input use for model training ( As model using customer inputs to improve it , amendment is contract through addendum without risk assessment 'B' is not first decison, however, it become necessity later). B. Conduct a data flow and risk assessment to classify exposure boundaries ( best first action inlining of security with use of AI for business enablement). C. Require the vendor to deploy a tenant-isolated model instance ( apparently good for securing model from data leakage but AI improvment through feed back loop would be unavaible, 'B' is balanced approach to proceed further or otherwise. D. Implement DLP controls to redact privileged content before submission ( removing/ obscuring sensitive data using DLP will definately mitigate the risk but will effect usability of contracts, therefore again 'B' is the best choice for balanced approach.
CISSP Practice Question (Domain 4: Communication and Network Security - Zero Trust)
Your company adopts Zero Trust and replaces the legacy VPN with identity-based access for remote workers. Six weeks in, helpdesk tickets spike: users complain that access to internal apps breaks unpredictably throughout the day. What is the MOST likely root cause? A. Insufficient bandwidth at the identity provider B. Continuous authentication is re-evaluating trust signals and revoking sessions C. DNS resolution failures between the client and the policy enforcement point D. Certificate pinning conflicts with the new SSO provider Come back for the answer tomorrow, or study more now!
3 likes • 8d
A. Insufficient bandwidth at the identity provider (its access break issue not experience of slowness / bandwidth problem). B. Continuous authentication is re-evaluating trust signals and revoking sessions ( As the company adopted NTNA which carry out contineous authentication and authorization, reomte access required to be fine tuned with new environment to avoid this unpredictable (intermittent) IAM issue > dynamic trust re-evaluation). C. DNS resolution failures between the client and the policy enforcement point ( In ZTNA, DNS usually resolves the application name to the ZTNA broker/gateway instead of the internal server, allowing identity verification before access is granted ). D. Certificate pinning conflicts with the new SSO provider (certificate pinning in SSO prevents MITM attacks by ensuring clients trust only the legitimate Idp certificate, protecting authentication credentials and tokens, as the intermittent problem is for remote aceess, its not for this reason. Permanent remote acess failure and working on local access will points towards certificate pinning which is not in this case). Therefore B seems the root cause.
1-10 of 140
Hassan Na
5
288points to level up
@hassan-hassan-4557
CISSP aspirant, ISC2 CC

Active 6h ago
Joined Dec 7, 2025
Powered by