User
Write something
Community Study Group (12/31) is happening in 13 hours
CISSP Practice Question – Security Architecture & Engineering (Post-Quantum Risk & Long-Term Data Confidentiality)
A pharmaceutical company stores decades of proprietary research data in encrypted archives. Recent threat intelligence reports warn that several nation-state actors are collecting large volumes of encrypted data today (“harvest-now, decrypt-later”) in preparation for future quantum decryption capabilities. The company currently uses RSA-2048 for key exchange and AES-256 for bulk encryption. What is the MOST critical action to take to protect the long-term confidentiality of this archived data? A. Increase RSA key length to 4096 bits to delay quantum-based decryption timelines. B. Migrate to a hybrid post-quantum key-establishment scheme (e.g., classical + lattice-based) for future encryptions and begin re-encrypting high-value archives. C. Deploy quantum-random number generators (QRNGs) to improve entropy for new cryptographic keys. D. Implement HSM-protected symmetric keys with annual rotation to strengthen present-day cryptographic hygiene.
CISSP Practice Question – Domain 6: Security Assessment & Testing
A large financial services company is updating its security testing program. The red team reports that modern AI-driven attack tools can automatically craft polymorphic payloads, evade signature-based controls, and generate targeted spear-phishing content indistinguishable from human-written messages.The CISO wants to ensure that the organization’s security testing program can accurately measure resilience against these new capabilities. Which testing approach MOST effectively validates the organization’s defenses against AI-augmented attack techniques? A. Perform quarterly vulnerability scans using updated threat signatures and CVE databases. B. Conduct adversarial machine learning (AML) evaluations to measure susceptibility to model poisoning and evasion attacks. C. Integrate AI-enabled BAS (Breach and Attack Simulation) tools that continuously replicate evolving attacker TTPs across email, endpoint, and network layers. D. Run annual red-team exercises focused on social engineering and spear-phishing campaigns executed manually by trained personnel.
CISSP Practice Question – Domain 2: Asset Security (Data Lifecycle, Cloud, and Zero Trust)
A multinational enterprise migrates sensitive analytics workloads to a cloud provider. The environment uses a zero-trust architecture, and encryption is enabled for data in transit and at rest. During a review, the CISO learns that several teams are using cloud-native analytics tools that temporarily decrypt and process customer PII inside managed service environments where the organization has no visibility into memory, caching, or key-handling operations. Which control is MOST critical to implement to maintain data-lifecycle protection under these conditions? A. Enforce customer-managed encryption keys (CMEK) and prohibit provider-managed key usage. B. Implement strict data-minimization and tokenization before data enters the cloud analytics pipeline. C. Require all analytics tools to run only in containers where memory and cache can be fully inspected. D. Mandate continuous CASB monitoring to detect shadow analytics workflows and unauthorized data feeds.
CISSP Practice Question – Security Architecture & Engineering (Information Flow Models)
A defense contractor is building a system that will store design data for classified weapons. Engineers must ensure that a user cleared for “Secret” cannot modify “Top Secret” design files, and that data from lower classifications can never compromise higher-level data integrity. Which information flow model BEST satisfies these requirements? A. Bell–LaPadula Model B. Biba Integrity Model C. Clark–Wilson Model D. Brewer–Nash (Chinese Wall) Model
CISSP exam pass! Late post 🙃
🚀🐦‍🔥☕️ Excited to share that I have provisionally passed the #CISSP exam from ISC2 👏👏👏 This journey took months of focused effort and discipline, including overcoming a previous failed attempt 😬. I was devastated after that first try, but I learned that you can't let one setback derail the entire goal. The key was to refocus and change my mindset. For me, my faith was essential in keeping the right attitude and posture. Thanks to my family, friends and coworkers ( I cannot mention all of them in this post, but you know who you are 😁) they kept me cheering on to pass. My study process looked like this: 🤓📚👓📖Months 1-2: I dedicated this time to improving my technical vocabulary and deeply understanding the concepts using the Destination Certification Inc. book and app , the Official ISC2 #CISSP #Study #Guide and coaching from coworkers. This involved reviewing areas from my first attempt that I knew I hadn't fully grasped. ⚙️Month 3: I shifted to practicing quizzes and questions to solidify my understanding and improve my speed and accuracy with key terms. Being intentional with the timing and separating calendar time and shared with my family. (Use AI to sort a plan for you if you need so) 👓Month 4: I started taking full practice exams, quizzes and vocabulary terms. Doing hand made review notes. Once I was consistently scoring and a passing range across multiple tests, I felt confident enough to book the exam and focus on my weakest domains always having accountability with coworkers and leads. 📖🙏🤲 Beyond study strategies, the biggest factor was mental preparation. My faith was my anchor; reminding myself, “I can do all things through Christ who strengthens me, Ph 4:3” and some other more verses I use with my kids to lift them up during their struggles, was crucial for rebuilding my confidence. For me ,this journey wasn't just about knowledge, but about resilience, determination, and faith. 🙏I’m grateful for this milestone and excited for the opportunities ahead to contribute, grow, and help others in the cybersecurity community, and also help other to achieve this .
CISSP exam pass! Late post 🙃
1-30 of 899
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by