Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Owned by Vincent

CISSP Study Group

1.8k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

OpenAI Study Group

1 member • Free

Share resources, get advice, and connect with peers studying for OpenAI certifications! Join our Study Group and meet fellow professionals today!

Memberships

Skoolers

178.5k members • Free

661 contributions to CISSP Study Group
CISSP Practice Question (Domain 6: Identity and Access Management)
A company integrates a third party SaaS platform with its internal systems using single sign on. During review, security finds the vendor provisions user roles automatically based on email domain, without management approval. The business values rapid onboarding. What is the MOST appropriate action for the security manager to take FIRST? A. Disable SSO integration until manual approvals are enforced B. Require documented access approval and role assignment controls C. Increase monitoring and audit logging for SaaS user activity D. Conduct a penetration test against the SaaS access controls Come back for the answer tomorrow, or study more now!
CISSP Practice Question (Domain 1: Security and Risk Management)
Senior leadership wants to launch a new customer analytics platform that processes regulated personal data. The CISO identifies control gaps that exceed the organization’s stated risk appetite, but executives are pushing for speed to market. What is the MOST appropriate action for the CISO to take NEXT? A. Document the risk and accept it to support business objectives B. Implement compensating controls within the security team C. Escalate the risk to senior management for formal risk acceptance D. Delay the project until all identified risks are fully mitigated Come back for the answer tomorrow! Study more now at CISSP.app
0 likes • 3h
@Dj Sahoo ✅ Correct Answer: C. Escalate the risk to senior management for formal risk acceptance CISSP Logic:When risk exceeds the organization’s stated risk appetite, the CISO does not have authority to accept it unilaterally. CISSP governance principles are explicit: only senior leadership or the designated risk owner can formally accept business risk. The CISO’s role is to clearly articulate the risk and ensure the acceptance decision is made at the correct level. Distractors: A. Risk acceptance without authority violates governance and accountability. B. Compensating controls may reduce risk but do not address acceptance above appetite. C. Correct. Risk above appetite must be escalated for executive decision-making. D. Security leaders advise; they do not unilaterally halt business initiatives. Managerial takeaway: Only senior leadership can accept risk that exceeds the organization’s risk appetite.
CISSP Practice Question (Domain 7: Security Operations / Evidence Handling & Logging)
After a suspected insider incident, system logs from multiple servers show inconsistent timestamps and missing entries. Legal counsel advises that the organization may face litigation. Operations wants logs centralized immediately to restore visibility. What should the security manager do FIRST? A. Centralize all logs immediately to improve operational monitoring B. Preserve existing logs and establish forensic chain of custody C. Reconfigure time synchronization across all affected systems D. Notify law enforcement and external counsel of potential evidence gaps
0 likes • 1d
@Pamela Solomon Correct Answer: B. Preserve existing logs and establish forensic chain of custody CISSP Logic:Once litigation is possible, the priority shifts from operations to evidentiary integrity. Logs are potential legal evidence, and any alteration—centralizing, normalizing, or fixing timestamps—can compromise admissibility. CISSP Domain 7 emphasizes preserving evidence first, maintaining chain of custody, and preventing spoliation before taking corrective or operational actions. Distractors:A. Centralizing logs alters original evidence and risks contaminating forensic integrity.B. Correct. Preserves evidence and protects legal standing before any remediation.C. Time synchronization fixes accuracy going forward but destroys evidentiary value of existing logs.D. Notification may be required later, but only after evidence is properly preserved. Managerial takeaway:When legal exposure exists, evidence preservation comes before visibility, remediation, or optimization.
CISSP Practice Question (Domain 6: Security Assessment & Testing / Penetration Testing Governance)
A penetration test identifies a critical vulnerability in a customer-facing application, but exploitation would require downtime during peak business hours. The business requests delaying remediation until the next quarterly release. What should the security manager do FIRST? A. Accept the risk and document the delay as requested B. Perform a risk assessment and present impact analysis to business leadership C. Immediately remediate the vulnerability despite business objections D. Disable the affected application until remediation is complete
1 like • 4d
@Pamela Solomon Correct, it is B. The first step is to perform a risk assessment and present impact analysis to leadership so they can make an informed risk decision. CISSP emphasizes that security managers provide analysis, while business leadership determines whether to accept, delay, or remediate risk.
Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide
A massive botnet targeting Android devices has emerged as one of the most significant threats in the cybersecurity landscape today. Named Kimwolf, this sophisticated malware has compromised approximately 1.8 million Android devices worldwide, including smart TVs, set-top boxes, tablets, and other Android-based systems. Security researchers discovered the botnet when a trusted community partner provided the initial sample in October 2025, which used a command-and-control domain ranked second in Cloudflare’s global domain popularity rankings. The botnet’s reach spans across 222 countries and regions, with the highest concentration of infected devices in Brazil (14.63%), India (12.71%), and the United States (9.58%). https://cybersecuritynews.com/kimwolf-android-botnet-hijacked/
0 likes • 5d
"a command-and-control domain ranked second in Cloudflare’s global domain popularity rankings." wow! second!
1-10 of 661
Vincent Primiani
7
5,535points to level up
Cybersecurity. The Study Group Guy.

Active 3h ago
Joined Apr 29, 2024
New York, NY
Powered by