Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

1.7k members • Free

12 contributions to CISSP Study Group
I passed my CISSP exam this week
Happy to share that I successfully passed my CISSP exam this week. Just wanted to encourage someone to jump in to. Pete Zeter exam cram, Quantum exam, CISSP official exam 10th edition were good ressources for me.
1 like • Jul 9
Congrats! how did this practise questions helped you?
Practice Question
Your organization is implementing a new cloud-based Security Information and Event Management (SIEM) system. You need to ensure that the SIEM effectively detects and alerts on security incidents. Which of the following is the MOST important step in this process? A. Configuring the SIEM to collect logs from all available sources, including network devices, servers, and applications. B. Developing and implementing use cases that are tailored to the organization's specific threat landscape and business requirements. C. Training the security team on how to use the SIEM system to investigate and respond to security incidents. D. Regularly testing and tuning the SIEM system to ensure that it is effectively detecting and alerting on real security incidents.
1 like • Jul 1
@Fouad Ahmed was thinking on A but understood your explanation. thank you.
Practice Question
MedTech Innovations, a research and development company specializing in medical devices, is developing a new prototype that utilizes advanced artificial intelligence (AI) algorithms. The prototype contains highly sensitive intellectual property (IP) and patient data. The company is collaborating with several external research institutions and vendors, requiring data sharing and access to the prototype's systems. The CISO is concerned about the potential for unauthorized access, data leakage, and tampering with the prototype. The company has a limited budget for security controls. Given the limited budget and the need to protect sensitive IP and patient data, which of the following asset security strategies is MOST critical for MedTech Innovations to implement? a) Implement a comprehensive data encryption strategy for all data at rest and in transit, utilizing homomorphic encryption for data processing. b) Conduct a thorough data classification exercise and implement strict access controls based on the principle of least privilege, with mandatory access control (MAC) for sensitive data. c) Deploy a network intrusion detection system (NIDS) and intrusion prevention system (IPS) to monitor and block unauthorized network traffic, with a focus on anomaly detection. d) Implement a robust vulnerability management program, including regular penetration testing and security assessments of the prototype's systems and applications.
2 likes • Jul 1
shoud be A or B but limited budged points to B
Practice Question
An e-commerce company collects and processes customer data, including payment card information. The company is expanding its operations to new regions with strict data protection laws. As part of its compliance efforts, the security team is tasked with ensuring proper data classification and implementing appropriate controls. While conducting a data classification audit, the team finds multiple unstructured data repositories containing customer information without clear labeling or access restrictions. Which of the following should the team do FIRST to mitigate this risk? A) Apply automated data discovery tools to identify and classify sensitive information. B) Implement data loss prevention (DLP) solutions to monitor and control data movement. C) Enforce access controls and least privilege principles on all data repositories. D) Develop a comprehensive data classification policy and train employees on data handling procedures.
1 like • Jun 30
D
Practice Question! (from our new app!)
A company is implementing a new cloud-based CRM system. During the risk assessment, it's identified that a data breach could result in significant financial losses and reputational damage. Which of the following is the MOST important security control to implement FIRST to mitigate this risk?
Poll
35 members have voted
Practice Question!  (from our new app!)
0 likes • Jun 29
Why not to go for a pen test first and then follow the other security controls from there?
0 likes • Jun 29
Got it, thanks
1-10 of 12
Nuno Paulo
2
7points to level up
@nuno-paulo-5583
solutions architect trying to be a CISSP certified.

Active 2h ago
Joined Jun 27, 2025
Powered by