Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CISSP Study Group

1.8k members • Free

40 contributions to CISSP Study Group
New questions posted
Hello my dear CISSP study group members, Sorry as I was away for more than 2 weeks, so busy at my new job. I posted new questions for your test prep. Feel free to reach out and I will reply to you as soon as I can. Best greetings 😇
0 likes • May 20
All the best in your new job
Read → Review → Practice → Repeat
Michael Bassey Thank you for a great tip to pass the CISSP exam. That formula — Read → Review → Practice → Repeat — is a solid, effective approach to cracking the CISSP exam. Let’s break it down in context of what it really means for CISSP success: Read - Go through the official CISSP study guide (e.g., Sybex or the Official ISC² CBK). - Focus on understanding concepts, not just memorizing facts. - Read with the 8 domains in mind and take notes in your own words. Review - Summarize what you’ve read. - Use flashcards, mind maps, or cheat sheets. - Review frequently to reinforce long-term retention — spaced repetition works wonders. Practice - Use practice exams and scenario-based questions (like the real exam). - Focus on why an answer is correct or incorrect. - Practice across all domains, emphasizing your weak areas. - Aim for at least 75–80% consistently in full-length timed exams. Repeat - Go back to the topics you struggled with and re-read them. - Re-practice those domain areas. - Repeat the cycle to solidify understanding and critical thinking, which CISSP requires. Bonus Tips: - Think like a manager, not a technician — CISSP tests decision-making at a policy level. - Use official practice tests from ISC² and tools like Boson or Thor Teaches. - Join a study group or take a bootcamp if you benefit from structured guidance. Final Thoughts: This formula works because it mirrors the learning cycle: Learn → Consolidate → Apply → Reinforce. Stick to this approach with discipline, and you’ll be in a strong position to pass the CISSP on your first attempt.
1 like • May 20
Thank you a million
Practice Question
Your organization has recently undergone a merger, and as the CISO, you are tasked with aligning security policies and risk management practices across both companies. You discover that one company uses a risk tolerance model based on quantitative assessments, while the other relies on qualitative risk matrices. You must produce a combined risk register and recommend a unified risk strategy. Senior leadership is pressing for a decision that allows consistent prioritization of risks across business units. What should you do first? A. Adopt the qualitative risk model from the second company for simplicity and faster implementation. B. Implement the quantitative model to maintain accuracy and support insurance negotiations. C. Conduct a business impact analysis (BIA) to inform which model best supports the new organization. D. Merge the two models to balance simplicity and rigor without needing further analysis.
1 like • May 20
C
Practice Question
You’re consulting for a healthcare organization that stores patient records in a hybrid cloud environment. The data is classified as "Highly Confidential." A developer in the team has requested access to production data to troubleshoot issues. The organization lacks a robust data classification enforcement policy. What is the BEST course of action? A. Allow the developer read-only access under supervision. B. Mask or anonymize the data before granting limited access. C. Grant access after requiring the developer to sign a confidentiality agreement. D. Deny access and escalate the request to the compliance team.
2 likes • May 20
B
Practice Question
You’re consulting for a healthcare organization that stores patient records in a hybrid cloud environment. The data is classified as "Highly Confidential." A developer in the team has requested access to production data to troubleshoot issues. The organization lacks a robust data classification enforcement policy. What is the BEST course of action? A. Allow the developer read-only access under supervision. B. Mask or anonymize the data before granting limited access. C. Grant access after requiring the developer to sign a confidentiality agreement. D. Deny access and escalate the request to the compliance team.
2 likes • May 7
I would go for B since data masking involves replacing sensitive data with realistic, yet fictional values, whilst data anonymization removes or modifies personally identifiable information so that individuals cannot be traced.
1-10 of 40
Isabel Antonio
3
31points to level up
@isabel-antonio-9749
Bella Anto

Active 193d ago
Joined Mar 17, 2025
Powered by