Activity
Mon
Wed
Fri
Sun
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Memberships

CISSP Study Group

2k members • Free

33 contributions to CISSP Study Group
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
An architect proposes implementing end-to-end encryption for all internal microservice communications. The SOC team warns this will eliminate their ability to inspect east-west traffic for lateral movement detection. Both teams escalate to you. What is the BEST course of action? A. Prioritize encryption and accept reduced network visibility as residual risk B. Reject encryption to preserve the SOC's detection capabilities C. Implement encryption with TLS termination points that allow authorized inspection D. Defer the decision until a formal threat model evaluates both risks Come back for the answer tomorrow, or study more now!
2 likes • 2d
A and B are technical measures, which we do not decide on without prior assessment and alignment with risk appetite and business needs. C is used for client-server topology, a proxy, but we are talking internal microservices here. The topology of microservice to server to microservice seems to be contradicting the architectural approach. This leaves D to evaluate and asses. Both choices, A and B, have strong merit, but ultimately: It depends. Again, this leaves us with option D. It might very well lead us to option C in the end, but first we need to identify the threats, and then define countermeasures.
CISSP Practice Question (Domain 2: Asset Security)
Your organization completes a data classification initiative and discovers that 40% of data labeled "confidential" has not been accessed in over three years. Storage costs are significant. Data owners across business units cannot confirm whether retention requirements still apply. What should you recommend FIRST? A. Archive the dormant data to lower-cost storage with existing classification labels B. Conduct a retention review with data owners and legal to validate regulatory obligations C. Declassify the unused data to reduce protection overhead and storage costs D. Implement automated data lifecycle policies to purge data exceeding retention thresholds Come back for the answer tomorrow, or study more now!
1 like • 7d
B can take a long time and will incur further costs as well as keep the current storage costs as high as they are. That is what we want to address in the first place, the running costs. D cannot take action as we lack actionable insights from the data owners. C is a no no as we always take educated decisions, which this option is simply not. Best option is A --> We FIRST lower costs while retaining the data.
CISSP Practice Question (Domain 7: Security Operations)
During a confirmed ransomware incident, the IR team identifies that the attacker is still actively exfiltrating data through a compromised service account. The legal team requests that no systems be taken offline to preserve evidence for potential litigation. Operations wants the bleeding stopped immediately. What should the incident commander prioritize FIRST? A. Disable the compromised service account to stop active data exfiltration B. Isolate affected network segments while preserving system state for forensics C. Initiate a full forensic image of all affected systems before any containment action D. Convene an emergency meeting with legal, operations, and security to align on priorities Come back for the answer tomorrow, or study more now!
1 like • 14d
SANS defined it in PICERL: Prevent, Identify, Contain, Eradicate, Recover, and Lessons learned. NIST defines it in their CSF a bit broader. Priority must be B to contain the blast radius to stop the bleeding and the damage being inflicted actively. This must be balanced with the legal needs and other business needs.
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
Your organization is migrating legacy on-premises applications to a multi-cloud environment. The security team discovers that several applications use hardcoded service account credentials that cannot be easily refactored before the migration deadline. Business leadership refuses to delay the timeline. What is the BEST approach? A. Migrate as planned and prioritize credential refactoring in the next sprint B. Implement secrets management and network segmentation around the vulnerable applications C. Present the risk formally to leadership with compensating control options and timeline impacts D. Reject the migration for applications with hardcoded credentials until remediation is complete Come back for the answer tomorrow, or study more now!
1 like • 17d
C --> onsult leadership first as the risk management board.
CISSP Practice Question (Domain 1: Security and Risk Management)
During a third-party risk assessment, you discover a critical SaaS vendor stores customer data in a jurisdiction that conflicts with your organization's data residency requirements. The vendor scores well on every other security benchmark. The contract renewal deadline is in two weeks. What should you do FIRST? A. Require the vendor to migrate data to a compliant region before renewal B. Engage legal counsel to assess regulatory exposure and contractual options C. Renew the contract with an addendum requiring future data residency compliance D. Begin evaluating alternative vendors that meet data residency requirements Come back for the answer tomorrow, or study more now!
1 like • 18d
Legal precedes if applicable to a situation --> B. For giggles, one could try A. See how the vendor reacts. C is possible but leaves you with an untreated violation even if done with legal binding agreements, which brings us back to option B again as well. D might be a measure, but only after B because it takes precedence.
1-10 of 33
Sebastian Maute
3
29points to level up
@sebastian-maute-5739
CISSP student. Learner. Traveller.

Active 20h ago
Joined Feb 9, 2026
Rosenheim
Powered by