Activity
Mon
Wed
Fri
Sun
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Memberships

CISSP Study Group

Public • 1.2k • Free

16 contributions to CISSP Study Group
Passed CISSP. Thank You
I passed my CISSP exam last week. Thanks for all my fellow study group members. You are very helpful in my preparation for the exam. This is a great forum and appreciate the comradery among the team members. Thanks.
19
9
New comment 15d ago
Practice Question
A recent security audit is reporting several unsuccessful login attempts being repeated at specific times during the day on an Internet facing authentication server. No alerts have been generated by the security information and event management (SIEM) system . What PRIMARY action should be taken to improve SIEM performance? A. Implement role-based system monitoring B. Audit firewall logs to identify the source of login attempts C. Enhance logging detail D. Confirm alarm thresholds
3
7
New comment Feb 11
0 likes • Feb 11
B. Answers C and D are also correct but to address issue on the hand, need to review firewall logs.
Practice Question!
Charles wants to deploy a credential management system (CMS) and keep the keys as secure as possible. Which of the following is the best design option for his CMS implementation?
Poll
39 members have voted
4
4
New comment Jan 20
2 likes • Jan 18
This is very interesting question. AES256 provides strong encryption, but HSM provides secure storage of keys. As the questions is related to securing keys, will go with HSM.
Practice Question
A financial institution wants to segment its internal network to reduce the risk of sensitive financial data being accessed by unauthorized employees. The segmentation must allow for monitoring and inspection of traffic between the segments. Which of the following would best meet these requirements? A. Implement virtual LANs (VLANs) without firewall rules between them. B. Deploy firewalls with strict access control lists (ACLs) between network segments. C. Use network address translation (NAT) to isolate the segments. D. Rely on intrusion detection systems (IDS) to monitor segment traffic.
5
12
New comment 24d ago
1 like • Jan 18
C
Practice Question
During a routine audit, you discover that an employee has been accessing sensitive financial data unrelated to their job function for several months. The activity was flagged by a security information and event management (SIEM) system, but no action was taken. Which process failure is most likely responsible, and how should it be addressed? A. Inadequate user training; implement mandatory security awareness programs. B. Poor SIEM configuration; refine alert thresholds and automate escalations. C. Insufficient monitoring coverage; deploy enhanced data loss prevention (DLP) tools. D. Lack of incident response procedures; create a clear escalation matrix for alerts.
2
6
New comment 22d ago
1 like • Jan 17
B
1-10 of 16
@sai-kalluri-9868
I have 30+ years of experience in Information Technology and 10+ years in Cybersecurity. I managed Risk and Data Protection teams.

Active 7d ago
Joined Jan 17, 2025
powered by