Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CISSP Study Group

1.8k members • Free

13 contributions to CISSP Study Group
CISSP Practice Question (Domain 6: Security Assessment & Testing / Penetration Testing Governance)
A penetration test identifies a critical vulnerability in a customer-facing application, but exploitation would require downtime during peak business hours. The business requests delaying remediation until the next quarterly release. What should the security manager do FIRST? A. Accept the risk and document the delay as requested B. Perform a risk assessment and present impact analysis to business leadership C. Immediately remediate the vulnerability despite business objections D. Disable the affected application until remediation is complete
5 likes • 1d
B: The security manager needs to perform a risk assessment and an impact analysis to business leadership first. It is their primary responsibility to ensure decisions are driven by risk considerations. No actions should be taken prior to quantifying the risks (understanding likelihood & impact) and presenting to leadership so they can make an informed decision.
CISSP Practice Question (Domain 8: Software Development Security / CI-CD Pipeline Controls)
An organization integrates automated security testing into its CI/CD pipeline. Shortly after deployment, build times increase significantly, and developers begin bypassing security checks to meet release deadlines. Senior management is concerned about both security and delivery velocity. What should the security lead do FIRST? A. Disable automated security testing to restore build speed B. Tune and prioritize security tests based on risk and criticality C. Enforce strict policy violations and discipline developers D. Move security testing entirely to post-deployment monitoring
4 likes • 4d
B: The automated security testing is slowing the process to the point developers are bypassing the controls to meet deliverables. The first thing the security lead is to do is prioritize the security tests based on risk and severity and then tune/adjust them ensuring the security posture remains without slowing down the developers productivity and ultimately effecting timely delivery.
CISSP Practice Question (Domain 4: Communication & Network Security / Zero Trust Architecture)
An organization adopts a Zero Trust model and removes implicit trust between internal network segments. Shortly after deployment, several business-critical applications experience latency and intermittent access failures. Leadership questions whether the Zero Trust initiative should be rolled back. What should the security architect do FIRST? A. Roll back Zero Trust controls to restore application performance B. Perform a targeted assessment to identify policy enforcement points causing disruption C. Permanently whitelist affected applications to bypass Zero Trust controls D. Escalate the issue to vendors to redesign the Zero Trust architecture
2 likes • 5d
B: It is critical to maintain the security posture of the Zero Trust Model/Implementation. The configuration should be diagnosed before changing any strategies such as roll backs or whitelists. Any actions taken before a diagnosis would weaken the security. Zero Trust should stay in place while discovering the root cause.
CISSP Practice Question (Domain 2: Asset Security / Data Lifecycle & Retention)
An organization migrating legacy file shares to a cloud collaboration platform discovers that several datasets contain regulated records with no documented retention periods or data owners. The business wants immediate migration to meet a project deadline. What should the security manager do FIRST? A. Migrate the data and address ownership and retention after cutover B. Identify data owners and define retention requirements before migration C. Apply default retention policies to all datasets to avoid delay D. Escalate the issue to legal and halt the migration indefinitely
3 likes • 6d
B: From an information security perspective, it is important to classify data, the appropriate ownership, and retention before migrating the legacy file shares for regulated data. It is a noncompliant issue if regulated data is moved without the appropriate controls in place.
CISSP Practice Question (Domain 3: Security Architecture & Engineering / Cryptographic Key Management)
A global enterprise is transitioning from long-term symmetric encryption keys to an automated key rotation system using hardware security modules (HSMs). During the rollout, application owners express concern that frequent rotation may disrupt legacy integrations and availability. What should the security architect do FIRST? A. Enforce the new key-rotation policy across all systems immediately B. Perform a risk assessment to evaluate availability impact and integration dependencies C. Allow legacy systems to retain long-term keys indefinitely D. Delay implementation until all applications are modernized
4 likes • 8d
B A risk assessment should be done first to identify things like which applications depend on the static keys, which applications frequent rotation can be safely rolled out to, the risk of frequent rotation if implemented, possible outage the implementation could cause, and the overall impact the roll out would have on the business. A risk assessment will always come before any enforcement of policy or implementation.
1-10 of 13
Pamela Solomon
3
42points to level up
@pamela-solomon-5177
Studying for CISSP – open to study groups and collaboration. Let’s connect and grow in cybersecurity.

Active 2h ago
Joined Aug 30, 2025
WDC
Powered by