Activity
Mon
Wed
Fri
Sun
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Memberships

CyberMAYnia CAREER

350 members • Free

CISSP Study Group

2k members • Free

The Blueprint

91 members • Free

41 contributions to CISSP Study Group
CISSP Practice Question (Domain 1: Security and Risk Management)
Your organization's AI ethics board recommends prohibiting facial recognition in employee monitoring. The COO objects, arguing it's needed for physical security in high-clearance areas. Both sides present valid business justifications. Who should make the FINAL risk acceptance decision? A. The AI ethics board since they have specialized governance authority B. The CISO based on security domain expertise and risk ownership C. The COO as the senior operational business leader with budget authority D. Senior management or the risk committee based on organizational risk tolerance Come back for the answer tomorrow, or study more now!
2 likes • 25d
I'm tempted by B. As it says risk ownership. The risk owner should be making the decisions if they are accountable for them
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A regulated organization designs a system where business users submit high value transactions through an application, while a separate service validates and commits them. Auditors later find administrators could bypass the application and update records directly in the database. Management wants assurance this cannot occur again. What is the MOST appropriate architectural control to implement NEXT? A. Stronger privileged user authentication and session recording B. Mandatory access control enforced at the database layer C. Constrained interfaces with enforced well formed transactions D. Increased database activity monitoring and alerting Come back for the answer tomorrow, or study more now!
1 like • Jan 10
I think B is the right answer. D doesn't prevent the issue. A records the issue but doesn't prevent. C could help but doesn't prevent database access. The constrained interface on the application won't prevent the side channel access. Controlling access at the database layer is the only way to prevent access
1 like • Jan 10
@Hassan Na good point. I was overthinking it and assuming there's no access apart from the defined service. And if you assume something it's usually the wrong answer
CISSP Practice Question (Domain 7: Security Operations / Incident Response & Legal Coordination)
During an active breach investigation, the incident response team discovers indicators suggesting a third party service provider may be the initial intrusion vector. Legal warns that premature notification could expose the company to liability, while operations wants immediate coordination to contain spread. What is the MOST appropriate action to take NEXT? A. Notify the service provider immediately with full technical findings B. Isolate affected integrations and preserve evidence before notification C. Escalate directly to law enforcement to avoid vendor disputes D. Delay all action until legal approves external communication Come back for the answer tomorrow, or study more now!
3 likes • Jan 9
In incident management think .. 🥁 DRMRRRL Think Detect respond mitigate... You can rule out A. What if you are wrong and sharing the information, doesn't stop the incident getting worse. C you don't need to escalate to law enforcement, they don't arbitrate over vendor disputes and it doesn't prevent the matter getting worse. D you could be waiting for ever. In the meantime it's getting worse. You need to prevent that. That leaves B, isolate. (Stops contagion) and preserve evidence for forensic investigation which will follow later.
CISSP Practice Question (Domain 1: Security and Risk Management / Emerging Technology Governance)
An organization deploys agentic AI systems that autonomously query external sources, make decisions, and trigger actions across business workflows. In one case, an agent exceeds its intended authority by chaining actions across systems without human approval. Leadership wants innovation but defensible governance. What is the MOST appropriate control to establish FIRST? A. Continuous monitoring of agent activity with real time alerting B. Strong authentication and API rate limiting for agent actions C. Clearly defined authority boundaries and risk ownership for agents D. Periodic audits of agent decisions and outcomes Come back for the answer tomorrow, or study more now!
2 likes • Jan 7
There's a clue in the question "intended authority" look for the keywords in the exam! Now read the answers. You'll know which is right
CISSP Practice Question (Domain 6: Security Assessment and Testing)
A regulated enterprise relies on continuous automated control testing dashboards for audit readiness. An external auditor notes controls appear effective, but underlying test logic was recently modified by the same team being assessed. Management wants minimal disruption. What is the MOST appropriate action to take NEXT? A. Accept results since controls are continuously monitored B. Perform an independent validation of assessment tools and methods C. Increase testing frequency to offset potential bias D. Document the issue as an accepted audit limitation Study more now!
1 like • Jan 5
I'd go D. D means the result is accepted but it's recognised it's not ideal. No disruption is caused. And that's the requirement in the question. A is worse than D, you accept the results but don't acknowledge the test issue. B creates a new audit cycle and you want to avoid disruption. Audits are disruptive. C would repeat the cycle and similar to B create disruption.
1-10 of 41
Justin Craigon
4
67points to level up
@justin-craigon-5642
Virtual CISO / Security consultant at BT

Active 15h ago
Joined Jul 14, 2025
Powered by