Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
What is this?
Less
More

Memberships

CISSP Study Group

2.1k members • Free

CyberMAYnia CAREER

441 members • Free

14 contributions to CISSP Study Group
CISSP Practice Question (Domain 6: Security Assessment and Testing)
An internal audit reveals that quarterly vulnerability scans are completed on schedule, but 40% of critical findings remain unremediated past SLA. The vulnerability management team reports the metrics as "green" because scans were performed. As the CISO, what is the BEST corrective action? A. Reduce scan frequency until remediation capacity catches up B. Redefine the program metrics to measure remediation outcomes, not scan activity C. Escalate overdue findings directly to system owners' executives D. Outsource remediation to a managed security service provider Come back for the answer tomorrow, or study more now!
0 likes • 3d
B
CISSP Practice Question (Domain 7: Security Operations - Cloud Incident Response)
A developer's leaked API key is used to spin up 400 cryptocurrency mining instances in your AWS account overnight. The monthly bill is now $180K over budget. What should the incident responder do FIRST? A. Terminate all unauthorized instances to stop the financial bleeding B. Rotate the compromised API key and disable the associated IAM user C. Snapshot the instances and preserve CloudTrail logs for forensic analysis D. Contact AWS billing to request a fraud-related credit Come back for the answer tomorrow, or study more now!
0 likes • 17d
B
CISSP Practice Question (Domain 1: Security and Risk Management - AI Exam Guidance)
Your company's HR department deploys a resume-screening AI tool without consulting security or legal. A rejected applicant files a discrimination complaint claiming the tool filtered out candidates based on age. Who should the CISO escalate to FIRST? A. The AI vendor to request bias testing documentation B. Legal counsel to assess regulatory exposure from the unauthorized deployment C. The HR director to immediately disable the tool D. Internal audit to begin a full algorithmic fairness review Come back for the answer tomorrow, or study more now!
0 likes • 27d
B
CISSP Practice Question (Domain 4: Communication and Network Security - AI Exam Guidance)
Your data science team trains ML models using distributed GPU clusters across three cloud regions. The security team discovers that training data and model parameters traverse the corporate WAN unencrypted alongside general business traffic. What should the network security architect recommend FIRST? A. Encrypt all WAN traffic using a site-to-site VPN between the three cloud regions B. Implement micro-segmentation to isolate AI training environments from enterprise traffic C. Deploy a CASB to monitor and control data movement between cloud regions D. Migrate all training workloads to a single region to eliminate cross-region data transit Come back for the answer tomorrow, or study more now!
0 likes • 28d
A
CISSP Practice Question (Domain 6: Security Assessment and Testing - AI Exam Guidance)
Your organization's fraud detection ML model passes all traditional software vulnerability scans. However, a red team discovers they can subtly alter transaction inputs to cause the model to misclassify fraudulent activity as legitimate. What testing gap does this BEST illustrate? A. The vulnerability scans lacked authenticated scanning credentials B. Static application security testing was not integrated into the CI/CD pipeline C. The assessment program did not include adversarial robustness testing of the model D. The red team should have coordinated findings with the vulnerability management team first Come back for the answer tomorrow, or study more now!
0 likes • Apr 13
C
1-10 of 14
Yehonatan Frenkel
2
15points to level up
@yehonatan-frenkel-2765
InfoSec Lead at Dynamic Yield

Active 7h ago
Joined Mar 9, 2026
Powered by