User
Write something
Community Study Session is happening in 3 hours
Pinned
Introductions
Welcome to the group! Please share what you hope to gain from being here, and for fun, tell us the best piece of advice you've ever received!
Pinned
🚨 Study Group Takeovers 🚨
May is one of the most respected CISSP instructors worldwide. She’s a ISC2 Board Member, co-author of the Official CISSP Study Guide, TEDx speaker, bestselling author (Scams, Hacking, and Cybersecurity), and a recognized leader in the global infosec community. Here’s what this means for you: 📚 Saturday Study Group Takeover - This is a chance to learn directly from one of the best and show her what Study Group is all about. 💡 CPE Credit – You can self-submit for 2 CPE credits for attending any Study Group session. 🎤 Pop-In Q&A – Keep joining Study Groups, because you never know when May might drop in for a quick Q&A. 🤝 Exciting Collaboration – This is just the beginning. May is supporting our community as the go-to place for those just starting, self-studying, or looking for a group to prepare for the CISSP with peers. Let’s pack Study Group and bring our best energy to show May the strength of our community. Show May your appreciation in the comments!
🚨 Study Group Takeovers 🚨
Pinned
CISSP Exam Pass Today 😎
I am excited to share that I have provisionally passed the CISSP exam today It took a while, months of effort and discipline, including overcoming a previous failed attempt. Thanks to my family, friends and CISSP Study Group Community, i could have not done this without any of you! @Vincent Primiani thanks for putting together this wonderful community of liked minded people, with a common goal of achieving the much sought after CISSP certification. I'm not going anywhere, i am still going to be a member of this community and help where i can, and of course onto the next one ......
CISSP Practice Question (Domain 3: Security Architecture & Engineering / Cryptographic Key Management)
A global enterprise is transitioning from long-term symmetric encryption keys to an automated key rotation system using hardware security modules (HSMs). During the rollout, application owners express concern that frequent rotation may disrupt legacy integrations and availability. What should the security architect do FIRST? A. Enforce the new key-rotation policy across all systems immediately B. Perform a risk assessment to evaluate availability impact and integration dependencies C. Allow legacy systems to retain long-term keys indefinitely D. Delay implementation until all applications are modernized
CISSP Practice Question (Domain 7: Security Operations / Supply Chain Risk)
An enterprise discovers that a widely used third-party monitoring agent embedded in multiple production servers has begun making undocumented outbound connections to an IP range controlled by a subcontractor the enterprise has never engaged. The agent is critical for operational visibility, and disabling it would blind several detection controls. No malicious activity has been confirmed, but threat intelligence reports suggest recent supply chain compromises involving similar agents. What should the security manager do FIRST? A. Immediately isolate all hosts running the agent from the network B. Conduct a rapid supplier risk reassessment and verify the legitimacy of the subcontractor relationship C. Disable the agent across production to eliminate potential exfiltration D. Escalate directly to regulators due to potential third-party data exposure
1-30 of 1,798
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by