Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
What is this?
Less
More

Memberships

CISSP Study Group

1.3k members β€’ Free

4 contributions to CISSP Study Group
I cleared CISSP 100 Q/2 hrs & 20 minutes
Many thanks to this community for continuous guidance and variety of questions. Special mention to. @Fouad Ahmed for the tough questions he’s posting consistently. My 3 months of preparations (precisely 80 days) for the exam included; Official study guide & practice questions LearnZapp subscription Pete Zerger (inside cloud and security) great videos on YouTube - exam cram 8 domains combined and 120 main concepts summarised. Skool community. P.S: You need focus on concepts and don’t expect any direct (theory) or straight forward questions. Time management is another important factor. Thank you!
12
10
New comment Mar 18
Practice Question
What are the PRIMARY responsibilities of security operations for handling and reporting violations and incidents? A. Monitoring and identifying system failures, documenting incidents for future analysis, and scheduling patches for systems B. Scheduling patches for systems, notifying the help desk, and alerting key personnel C. Monitoring and identifying system failures, alerting key personnel, and containing events D. Documenting incidents for future analysis, notifying end users, and containing events
4
6
New comment 18d ago
2 likes β€’ Mar 4
C
Practice Question
You are investigating a phishing email incident. The email contains a link to a suspicious website. What is the BEST way to analyze the website without risking infection of your forensic workstation? a) Click the link directly to examine the website's content. b) Use a virtual machine or sandboxed environment to access and analyze the website. c) Forward the email to the website administrator to report the phishing attempt. d) Ignore the link and focus on analyzing the email itself.
6
9
New comment 18d ago
3 likes β€’ Mar 4
B Sandboxing env or a virtual machine can help the investigation in an isolated way.
Practice Question
GlobalCorp, a multinational financial institution, is expanding its cloud presence, leveraging multiple Infrastructure as a Service (IaaS) providers. They are implementing a new data analytics platform that processes sensitive customer data from various regions. Due to recent regulatory changes in several countries, GlobalCorp must ensure strict data sovereignty and residency requirements. The Chief Information Security Officer (CISO) is concerned about the potential for data breaches and non-compliance with these regulations. The current security architecture lacks centralized visibility and control over data flows and access across the cloud providers. Which of the following is the MOST effective approach for GlobalCorp to address the challenges of data sovereignty, residency, and centralized security management in their multi-cloud environment? a) Implement a cloud-native security information and event management (SIEM) solution integrated with each IaaS provider's logging and monitoring services, focusing on regional data centers. b) Deploy a cloud access security broker (CASB) that provides visibility and control over data access, usage, and movement across all cloud providers, with data loss prevention (DLP) and encryption capabilities. c) Establish a dedicated security operations center (SOC) staffed with regional experts in each country where data is processed, relying on manual monitoring and incident response. d) Create a custom-built data governance platform that enforces data residency rules by replicating data across multiple regions within each cloud provider, ensuring redundancy and availability.
7
7
New comment 18d ago
3 likes β€’ Mar 4
B Considering centralised security management on multi cloud environments.
1-4 of 4
@rajeev-menon-3881
Cybersecurity and Risk Consultant - CISM

Active 2d ago
Joined Feb 15, 2025
powered by