Activity
Mon
Wed
Fri
Sun
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Owned by Vincent

CISSP Study Group

2k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

OpenAI Study Group

1 member • Free

Share resources, get advice, and connect with peers studying for OpenAI certifications! Join our Study Group and meet fellow professionals today!

Memberships

CyberMAYnia CAREER

358 members • Free

Skoolers

191.5k members • Free

753 contributions to CISSP Study Group
CISSP Practice Question (Domain 1: Security and Risk Management)
Your organization acquires a competitor and inherits their customer database containing PII subject to GDPR. The integration team wants to merge both databases immediately to eliminate duplicate customer records. The acquired company's privacy notices did not disclose data sharing with third parties. What should you do FIRST? A. Obtain updated consent from the acquired company's customers before merging B. Conduct a data protection impact assessment on the proposed database merge C. Proceed with the merge using the acquiring company's existing privacy framework D. Engage the DPO to determine whether a lawful basis for processing exists under the new entity Come back for the answer tomorrow, or study more now!
CISSP Practice Question (Domain 6: Security Assessment and Testing)
Your organization passes its annual SOC 2 Type II audit with no findings. Two months later, a penetration test reveals a critical vulnerability in a customer-facing application that has existed for over a year. The board questions why the audit missed it. What is the BEST explanation? A. The penetration testing firm used more advanced techniques than the SOC 2 auditors B. SOC 2 evaluates control design and operating effectiveness, not technical vulnerability discovery C. The audit scope was improperly defined and should have included application testing D. The auditors failed to meet professional due diligence standards Come back for the answer tomorrow, or study more now!
0 likes • 4h
@Dj Sahoo Correct Answer: B. Conduct a retention review with data owners and legal to validate regulatory obligations Explanation (CISSP logic): The key phrase is "cannot confirm whether retention requirements still apply." You're sitting on a pile of data classified as confidential, but nobody knows if it's being held for regulatory reasons, legal hold, contractual obligation, or just inertia. Every other action assumes you already know the answer to that question. Domain 2 is clear: data lifecycle decisions require understanding the obligations attached to the data before you move, reclassify, or destroy anything. Data owners and legal are the two parties who can validate those obligations. Breakdown: A. Archive to lower-cost storage - Reduces cost but doesn't answer the fundamental question. You might be archiving data you're legally required to destroy, or preserving data in a way that doesn't meet regulatory requirements for accessibility. B. ✅ Correct. Establishes the factual basis for every downstream decision. You can't archive, declassify, or purge until you know what obligations are attached to the data. C. Declassify the unused data - Extremely dangerous. "Unused" does not mean "unimportant." Confidential data doesn't lose its sensitivity because nobody opened it recently. Declassifying without understanding regulatory context could create compliance violations overnight. D. Automated lifecycle purge policies - The right long-term destination, but automating deletion when you don't even know your retention obligations is how organizations destroy evidence or violate data protection laws. Think like a manager: Data you don't understand is data you can't govern. Before you move it, shrink it, or delete it, find out why it exists.
CISSP Practice Question (Domain 2: Asset Security)
Your organization completes a data classification initiative and discovers that 40% of data labeled "confidential" has not been accessed in over three years. Storage costs are significant. Data owners across business units cannot confirm whether retention requirements still apply. What should you recommend FIRST? A. Archive the dormant data to lower-cost storage with existing classification labels B. Conduct a retention review with data owners and legal to validate regulatory obligations C. Declassify the unused data to reduce protection overhead and storage costs D. Implement automated data lifecycle policies to purge data exceeding retention thresholds Come back for the answer tomorrow, or study more now!
0 likes • 1d
@Enrico Sciullo Correct Answer: B. Conduct a retention review with data owners and legal to validate regulatory obligations Explanation (CISSP logic): The key phrase is "cannot confirm whether retention requirements still apply." You're sitting on a pile of data classified as confidential, but nobody knows if it's being held for regulatory reasons, legal hold, contractual obligation, or just inertia. Every other action assumes you already know the answer to that question. Domain 2 is clear: data lifecycle decisions require understanding the obligations attached to the data before you move, reclassify, or destroy anything. Data owners and legal are the two parties who can validate those obligations. Breakdown: A. Archive to lower-cost storage - Reduces cost but doesn't answer the fundamental question. You might be archiving data you're legally required to destroy, or preserving data in a way that doesn't meet regulatory requirements for accessibility. B. ✅ Correct. Establishes the factual basis for every downstream decision. You can't archive, declassify, or purge until you know what obligations are attached to the data. C. Declassify the unused data - Extremely dangerous. "Unused" does not mean "unimportant." Confidential data doesn't lose its sensitivity because nobody opened it recently. Declassifying without understanding regulatory context could create compliance violations overnight. D. Automated lifecycle purge policies - The right long-term destination, but automating deletion when you don't even know your retention obligations is how organizations destroy evidence or violate data protection laws. Think like a manager: Data you don't understand is data you can't govern. Before you move it, shrink it, or delete it, find out why it exists.
CISSP Practice Question (Domain 7: Security Operations)
During a confirmed ransomware incident, the IR team identifies that the attacker is still actively exfiltrating data through a compromised service account. The legal team requests that no systems be taken offline to preserve evidence for potential litigation. Operations wants the bleeding stopped immediately. What should the incident commander prioritize FIRST? A. Disable the compromised service account to stop active data exfiltration B. Isolate affected network segments while preserving system state for forensics C. Initiate a full forensic image of all affected systems before any containment action D. Convene an emergency meeting with legal, operations, and security to align on priorities Come back for the answer tomorrow, or study more now!
CISSP Practice Question (Domain 4: Communication and Network Security)
A remote workforce uses split-tunnel VPN to reduce bandwidth costs. The security team discovers employees are accessing sanctioned SaaS applications directly from home networks, bypassing the corporate proxy and DLP controls. Management values the current performance gains. What is the MOST appropriate recommendation? A. Switch to full-tunnel VPN to route all traffic through corporate controls B. Deploy a cloud-based secure web gateway to enforce policy at the endpoint C. Accept the risk and document the DLP gap as a known exception D. Restrict SaaS access to corporate-managed devices only Come back for the answer tomorrow, or study more now!
0 likes • 10d
@Mercy Mensah Correct Answer: B. Deploy a cloud-based secure web gateway to enforce policy at the endpoint Explanation (CISSP logic): This question tests whether you can solve a security gap without undoing a legitimate business decision. Management already weighed in: split-tunnel stays because the performance gains matter. Full-tunnel would fix the control gap but directly contradicts that business requirement. The CISSP-aligned approach is finding a control that meets security objectives within the constraints you've been given. A cloud-based secure web gateway enforces DLP and proxy policy regardless of tunnel configuration, protecting data without degrading the user experience management wants to preserve. Breakdown: A. Full-tunnel VPN - The "obvious" security answer, but it ignores the stated business constraint. Management values the performance gains. Recommending the exact thing they've already rejected is tone-deaf and wastes political capital. B. ✅ Correct. Maintains the split-tunnel architecture management wants while closing the DLP gap. Policy enforcement follows the user to the endpoint rather than depending on network path. C. Accept the risk and document - This might be appropriate if no viable control existed, but it does. Accepting a gap you can reasonably close is not good risk management, it's avoidance disguised as acceptance. D. Restrict to managed devices only - Addresses device trust but doesn't solve the traffic bypass problem. A managed device on a split tunnel still routes SaaS traffic outside corporate controls. Think like a manager: When the business draws a line, don't fight the constraint. Find the control that works within it. Security that ignores business reality doesn't get implemented.
1-10 of 753
Vincent Primiani
7
5,130points to level up
Cybersecurity. The Study Group Guy.

Active 4h ago
Joined Apr 29, 2024
New York, NY
Powered by