Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CyberMAYnia CAREER

222 members • Free

CISSP Study Group

1.9k members • Free

The Blueprint

91 members • Free

40 contributions to CISSP Study Group
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A regulated organization designs a system where business users submit high value transactions through an application, while a separate service validates and commits them. Auditors later find administrators could bypass the application and update records directly in the database. Management wants assurance this cannot occur again. What is the MOST appropriate architectural control to implement NEXT? A. Stronger privileged user authentication and session recording B. Mandatory access control enforced at the database layer C. Constrained interfaces with enforced well formed transactions D. Increased database activity monitoring and alerting Come back for the answer tomorrow, or study more now!
1 like • 23d
I think B is the right answer. D doesn't prevent the issue. A records the issue but doesn't prevent. C could help but doesn't prevent database access. The constrained interface on the application won't prevent the side channel access. Controlling access at the database layer is the only way to prevent access
1 like • 23d
@Hassan Na good point. I was overthinking it and assuming there's no access apart from the defined service. And if you assume something it's usually the wrong answer
CISSP Practice Question (Domain 7: Security Operations / Incident Response & Legal Coordination)
During an active breach investigation, the incident response team discovers indicators suggesting a third party service provider may be the initial intrusion vector. Legal warns that premature notification could expose the company to liability, while operations wants immediate coordination to contain spread. What is the MOST appropriate action to take NEXT? A. Notify the service provider immediately with full technical findings B. Isolate affected integrations and preserve evidence before notification C. Escalate directly to law enforcement to avoid vendor disputes D. Delay all action until legal approves external communication Come back for the answer tomorrow, or study more now!
3 likes • 24d
In incident management think .. 🥁 DRMRRRL Think Detect respond mitigate... You can rule out A. What if you are wrong and sharing the information, doesn't stop the incident getting worse. C you don't need to escalate to law enforcement, they don't arbitrate over vendor disputes and it doesn't prevent the matter getting worse. D you could be waiting for ever. In the meantime it's getting worse. You need to prevent that. That leaves B, isolate. (Stops contagion) and preserve evidence for forensic investigation which will follow later.
CISSP Practice Question (Domain 1: Security and Risk Management / Emerging Technology Governance)
An organization deploys agentic AI systems that autonomously query external sources, make decisions, and trigger actions across business workflows. In one case, an agent exceeds its intended authority by chaining actions across systems without human approval. Leadership wants innovation but defensible governance. What is the MOST appropriate control to establish FIRST? A. Continuous monitoring of agent activity with real time alerting B. Strong authentication and API rate limiting for agent actions C. Clearly defined authority boundaries and risk ownership for agents D. Periodic audits of agent decisions and outcomes Come back for the answer tomorrow, or study more now!
2 likes • 26d
There's a clue in the question "intended authority" look for the keywords in the exam! Now read the answers. You'll know which is right
CISSP Practice Question (Domain 6: Security Assessment and Testing)
A regulated enterprise relies on continuous automated control testing dashboards for audit readiness. An external auditor notes controls appear effective, but underlying test logic was recently modified by the same team being assessed. Management wants minimal disruption. What is the MOST appropriate action to take NEXT? A. Accept results since controls are continuously monitored B. Perform an independent validation of assessment tools and methods C. Increase testing frequency to offset potential bias D. Document the issue as an accepted audit limitation Study more now!
1 like • 28d
I'd go D. D means the result is accepted but it's recognised it's not ideal. No disruption is caused. And that's the requirement in the question. A is worse than D, you accept the results but don't acknowledge the test issue. B creates a new audit cycle and you want to avoid disruption. Audits are disruptive. C would repeat the cycle and similar to B create disruption.
CISSP Practice Question (Domain 7: Security Operations / Incident Management & Governance)
During a multi-day incident response, the SOC lead wants to share detailed forensic findings in real time with executives and affected business units. Legal advises limiting distribution to avoid discoverability risk, while executives want transparency to make decisions. What is the MOST appropriate action for the incident commander to take FIRST? A. Distribute full forensic findings to ensure informed executive decisions B. Establish an executive level incident briefing with sanitized summaries C. Defer communication until the investigation is fully complete D. Allow legal to control all incident communications Come back for the answer tomorrow, or study more now!
1 like • 30d
Legal doesn't trump the business. So that rules out D. C doesn't meet the real time information request so that's out. A is plausible but the execs don't need to know everything, it's our role to summarise, present and recommend. B is the best answer here, with A as a second choice. @Hassan Na has nailed the explanation
0 likes • 28d
@Elihu El 🤦
1-10 of 40
Justin Craigon
4
69points to level up
@justin-craigon-5642
Virtual CISO / Security consultant at BT

Active 13d ago
Joined Jul 14, 2025
Powered by