Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

1.7k members • Free

34 contributions to CISSP Study Group
CISSP Practice Question – Domain 4 (Communication & Network Security)
A global enterprise adopts a strict zero-trust network architecture. All workloads—on-prem, cloud, and containerized—must mutually authenticate before communicating. To comply with regulatory requirements, the company must also maintain full packet-level visibility for threat analysis and incident response. Which solution BEST satisfies all of these requirements simultaneously? A. Deploy full end-to-end TLS between all workloads and rely on IDS/IPS to inspect only metadata and flow logs. B. Use a TLS termination proxy at network choke points and decrypt all internal traffic for inspection before re-encrypting. C. Implement mutual TLS within a service mesh that supports encrypted telemetry export and out-of-band traffic mirroring for deep packet inspection. D. Use host-based agents to perform inline decryption on each workload and send decrypted payload streams to the central IDS via secure channels.
0 likes • 2h
C. service mesh (e.g., Istio, Linkerd, Consul) natively enables mutual TLS (mTLS) between all workloads across on‑prem, cloud, and containerized environments. This satisfies the 0‑trust requirement ~ enforcing strong identity, mutual authentication, and policy-based authorization at the workload level—without relying on the underlying network to be trustworthy. The mesh’s sidecar proxy architecture provides a practical way to achieve full packet‑level visibility. Right?
CISSP Practice Question – Software Development Security (AI-Assisted SDLC & Risk Governance)
A global fintech company adopts an AI-assisted code-generation platform to accelerate development.The CISO learns that developers sometimes allow the tool to access proprietary source repositories and external training data. Management wants faster delivery but is concerned about intellectual-property leakage and unvetted open-source dependencies being inserted into production builds. What is the BEST control to implement FIRST? A. Require legal review of the vendor’s AI license terms and intellectual-property indemnification clauses. B. Integrate automated software-composition analysis (SCA) and code-signing into the CI/CD pipeline to validate all generated components. C. Restrict the AI tool’s access to internal repositories and enforce output review through secure-coding peer validation. D. Mandate retraining of the AI model using only internal proprietary data to eliminate third-party influence.
1 like • 21d
Best, First control would be C. because it mitigates the highest-risk issue: proprietary code exposure and untrusted AI-generated output
CISSP Practice Question – Security Operations (Incident Response & Forensics Maturity)
Which of the following actions BEST balances regulatory obligations with evidence integrity and due diligence? A. Release preliminary findings immediately, clearly labeled as “provisional,” and continue full forensic analysis. B. Delay all external communication until the full investigation is complete and validated. C. Provide regulators with a high-level incident acknowledgment, outline the investigation timeline, and commit to an official report after evidence validation. D. Provide sanitized technical logs to regulators immediately while withholding full forensic images until legal review.
1 like • 25d
C. - Why? Most frameworks/regulations require a timely acknowledgement. This measure avoid premature release of potentially misleading forensic data. It demonstrates transparency without sacrificing chain-of-custody. It reduces the risk of exposure to liability from incorrect early findings, yet maintains trust with regulators.
CISSP Practice Question – Identity & Access Management (Federation and Trust Boundaries)
A global enterprise has implemented federated identity management using SAML between its internal Active Directory domain and multiple cloud SaaS providers. During testing, a partner organization asks to use the same SAML assertions from the enterprise’s identity provider (IdP) to access shared applications hosted in the partner’s environment. Which of the following must the enterprise ensure FIRST before extending this trust? A. The partner’s service provider (SP) certificate is issued by the same certificate authority (CA) as the enterprise’s IdP. B. The partner’s SP enforces attribute-based access control (ABAC) using SAML attributes. C. A formal trust agreement defines assertion validity, encryption standards, and identity-proofing responsibilities between both organizations. D. The enterprise IdP is configured to issue assertions with short lifetimes (e.g., < 5 minutes) to limit misuse.
1 like • 28d
C - legal & technical foundation is essential before any configuration or attribute-based access control can be safely implemented. A. is not necessary - Trust is based on the public key. B is a policy decision & note a prerequisite. D. Is a good security practice, but not the 1st thing to ensue when extending trust to a new organization. Right?
CISSP Practice Question – Communication & Network Security (Encryption Architecture)
A multinational enterprise uses an MPLS WAN to connect global offices. The company wants to add end-to-end encryption to protect confidential data but still allow its IDS/IPS systems at key choke points to inspect for malicious traffic. Which of the following design approaches BEST satisfies both confidentiality and monitoring requirements? A. Deploy full-mesh IPsec tunnels between all sites to ensure maximum privacy of traffic. B. Implement TLS encryption from client to server for all applications, and disable packet inspection. C. Use gateway-to-gateway VPN encryption within the MPLS backbone, and terminate the tunnels at trusted inspection points. D. Encrypt traffic at Layer 2 using MACsec (802.1AE) to protect data across the WAN.
1 like • 29d
C - should provide Gwy2Gwy encryption, inspection by terminating at trusted insp. points. and more scalable than mesh.
1-10 of 34
Martin Joplin
3
42points to level up
@martin-joplin-1962
I have 35+ years of IT experience with more than 15 years in IT management. Within the past 2 years I decided that I enjoyed Cybersecurity & ...

Active 2h ago
Joined Sep 3, 2024
Powered by