User
Write something
Pinned
Passed CCSP @ 100 Questions on 3/10/26 (cissp.app helped!)
Hi All, I used this group heavily for my CISSP studying last year. This year I studied for the CCSP so I did not participate in the group. However, I used the https://cissp.app/ app in the last week for practice questions and the mock exam feature. It is excellent! The mock exam was the hardest and most realistic of all the practices exam I took for the CCSP. It is adaptive based on your responses and has similar style to the real exam where you can't make sense of the question or answers until rereading a few times. I highly recommend it!
Pinned
🚨 Study Group Takeovers 🚨
May is one of the most respected CISSP instructors worldwide. She’s a ISC2 Board Member, co-author of the Official CISSP Study Guide, TEDx speaker, bestselling author (Scams, Hacking, and Cybersecurity), and a recognized leader in the global infosec community. Here’s what this means for you: 📚 Saturday Study Group Takeover - This is a chance to learn directly from one of the best and show her what Study Group is all about. 💡 CPE Credit – You can self-submit for 2 CPE credits for attending any Study Group session. 🎤 Pop-In Q&A – Keep joining Study Groups, because you never know when May might drop in for a quick Q&A. 🤝 Exciting Collaboration – This is just the beginning. May is supporting our community as the go-to place for those just starting, self-studying, or looking for a group to prepare for the CISSP with peers. Let’s pack Study Group and bring our best energy to show May the strength of our community. Show May your appreciation in the comments!
🚨 Study Group Takeovers 🚨
CISSP Practice Question (Domain 7: Security Operations)
During a confirmed ransomware incident, the IR team identifies that the attacker is still actively exfiltrating data through a compromised service account. The legal team requests that no systems be taken offline to preserve evidence for potential litigation. Operations wants the bleeding stopped immediately. What should the incident commander prioritize FIRST? A. Disable the compromised service account to stop active data exfiltration B. Isolate affected network segments while preserving system state for forensics C. Initiate a full forensic image of all affected systems before any containment action D. Convene an emergency meeting with legal, operations, and security to align on priorities Come back for the answer tomorrow, or study more now!
Strong vs Best changes the answer option completly ?
A financial institution is implementing a new authentication system for its high-security online banking platform. Which of the following combinations BEST represents (strong vs best ) multi-factor authentication approach using two distinct authentication factors? Options: - Combining a smart card and a password Best - Requiring a USB security key and a one-time password (OTP) Strong - Using a password and a security question - Implementing facial recognition and a PIN
CISSP Practice Question (Domain 4: Communication and Network Security)
A remote workforce uses split-tunnel VPN to reduce bandwidth costs. The security team discovers employees are accessing sanctioned SaaS applications directly from home networks, bypassing the corporate proxy and DLP controls. Management values the current performance gains. What is the MOST appropriate recommendation? A. Switch to full-tunnel VPN to route all traffic through corporate controls B. Deploy a cloud-based secure web gateway to enforce policy at the endpoint C. Accept the risk and document the DLP gap as a known exception D. Restrict SaaS access to corporate-managed devices only Come back for the answer tomorrow, or study more now!
1-30 of 1,946
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by