Activity
Mon
Wed
Fri
Sun
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
What is this?
Less
More

Memberships

CISSP Study Group

1.8k members • Free

36 contributions to CISSP Study Group
Battled the beast and won!
Took my exam yesterday and it cut me off after the 100 question mark. I filled up the endorsement form and the waiting game begins. Special thanks to @Vincent Primiani for building such a supportive, encouraging community.
1 like • 8h
@Alton Butler Thanks Alton. I hope you get to the cert soon!
0 likes • 8h
@Wilbert Philippe Thanks Wilbert. Wish you the best on your certification journey!
CISSP Practice Question (Domain 2: Asset Security / Data Ownership & Accountability)
A company migrates sensitive business data to a shared analytics environment used by multiple departments. Data accuracy issues emerge, but no single group can authorize correction because ownership is unclear. Leadership wants faster decisions without creating a centralized bottleneck. What is the MOST appropriate governance action to take FIRST? A. Assign a single enterprise data steward for all analytics data B. Define data ownership and decision authority at the dataset level C. Implement stricter change control over analytics transformations D. Increase audit logging for data modifications and access Come back for the answer tomorrow, or study more now!
3 likes • 3d
@Ivo Mulders Succinct, effective - the right answer 👍
CISSP Practice Question (Domain 6: Security Assessment and Testing)
A company uses red team exercises to validate detection and response capabilities. After several successful simulations, leadership concludes incident readiness is high. An independent review finds that scenarios are reused and defenders have begun anticipating tactics. Management wants realistic assurance without increasing test frequency. What is the MOST appropriate change to make? A. Rotate red team members to reduce defender familiarity B. Introduce threat informed testing with adaptive scenario design C. Increase reliance on automated attack simulation tools D. Separate detection and response teams during exercises Come back for the answer tomorrow, or study more now!
3 likes • 4d
B looks good cause of the adaptive nature of the simulation system. A - Job rotation is good but out of band sharing of information about the system could compromise the effectiveness of the exercise C - Automation relies on routine scenarios - will not be effective D - Separate teams? Now you're just getting irresponsible with the budget.
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A regulated organization designs a system where business users submit high value transactions through an application, while a separate service validates and commits them. Auditors later find administrators could bypass the application and update records directly in the database. Management wants assurance this cannot occur again. What is the MOST appropriate architectural control to implement NEXT? A. Stronger privileged user authentication and session recording B. Mandatory access control enforced at the database layer C. Constrained interfaces with enforced well formed transactions D. Increased database activity monitoring and alerting Come back for the answer tomorrow, or study more now!
0 likes • 4d
@Allison Regan Clark Wilson is the security model that requires a user to interact with a constrained interface - like a web form with email field types, or phone field types, or drop down lists - instead of directly interacting with the DB. In this case, the interface also would log who makes what change so if something untoward is entered in the DB, one would be able to trace the interaction to an identity.
1 like • 4d
@Allison Regan Happy to help!
CISSP Practice Question (Domain 1: Security and Risk Management / Board Oversight & Accountability)
Following a major security incident, the board asks management to demonstrate that security investments over the past two years were aligned to enterprise risk, not just technical best practices. Metrics show control maturity, but not business impact reduction. What is the MOST appropriate action to take NEXT? A. Map historical security controls to compliance framework requirements B. Reframe security reporting around risk scenarios and loss exposure C. Commission an external benchmark against industry peers D. Increase board level security training and awareness sessions Come back for the answer tomorrow, or study more now!
2 likes • 5d
B - aligns with the scenario posed. Balancing risk to the business with the reports justifying the security investments. A - nothing to do with the question C - doesn't reference business risk D - Not a training/awareness concern
1-10 of 36
Vivek Sridhar
4
70points to level up
@vivek-sridhar-5050
Starting out in Cybersecurity

Active 8h ago
Joined Dec 3, 2025
Powered by