Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CyberMAYnia CAREER

133 members • Free

CyberMAYnia Club

57 members • Free

GovTech Community (Free)

16.7k members • Free

The Cyber Community

7k members • Free

CISSP Study Group

1.8k members • Free

89 contributions to CISSP Study Group
CISSP Practice Question (Domain 7: Security Operations / Supply Chain Risk)
An enterprise discovers that a widely used third-party monitoring agent embedded in multiple production servers has begun making undocumented outbound connections to an IP range controlled by a subcontractor the enterprise has never engaged. The agent is critical for operational visibility, and disabling it would blind several detection controls. No malicious activity has been confirmed, but threat intelligence reports suggest recent supply chain compromises involving similar agents. What should the security manager do FIRST? A. Immediately isolate all hosts running the agent from the network B. Conduct a rapid supplier risk reassessment and verify the legitimacy of the subcontractor relationship C. Disable the agent across production to eliminate potential exfiltration D. Escalate directly to regulators due to potential third-party data exposure
0 likes • 3d
B.
CISSP Practice Question (Domain 7: Security Operations / Incident Response + AI Context)
Rymar Tech’s SOC deploys a new AI-based anomaly detection system that suddenly begins generating an unusually high volume of high-risk alerts after being retrained with third-party data the previous night. No malicious activity has been confirmed, but the alert surge is overwhelming SOC analysts and impacting monitoring effectiveness. What should the incident response manager do FIRST? A. Disable the AI platform and revert to manual triage B. Escalate to the CISO and declare a security incident C. Initiate the incident response process beginning with detection and verification D. Conduct a model validation review with the third-party integrator
2 likes • 4d
C
CISSP Practice Question (Domain 1: Security and Risk Management)
A regional bank adopts a new third-party transaction-scoring engine hosted in the cloud. The vendor refuses to provide detailed architectural diagrams but offers recent SOC 2 Type II reports. Executives want rapid deployment, but regulators recently flagged the bank for weak vendor oversight. What is the MOST appropriate next step? A. Require the vendor to provide full network diagrams before integration B. Review and validate the SOC 2 report against the bank’s control objectives C. Conduct a full on-site audit of the vendor’s operations D. Delay onboarding until regulators approve the vendor’s environment
0 likes • 4d
B
CISSP EXAM Writer Insights. Worth Reading
ISC2 CISSP Exam Writer insight. Disclaimer: Please do not ask for any questions on the exam or specific books to use) Welcome to the Cult! Your background is exactly the candidate we are looking for and it is actually why you passed at 100. For those prepping….. Study guides, cheat sheets, etc are great; but they can only take you so far. Experience and understanding will. Understanding the concepts is PARAMOUNT. I cannot stress that enough. Trying to use practice exams to teach you and memorize answers, will definitely cause you to fail. A little bit about the use of ChatGPT. Asking it for help figuring out information is “okay”, but I would not be over reliant on it for generating questions. But I will give a study tip that I used when I took mine over a decade ago. There are a lot of resources now for you that can be used to determine where your weaknesses are. Instead of using ChatGPT to write a question for you. Write your OWN questions. Let me explain. Think of it in 3 levels; easy, moderate, hard. If you don’t understand a concept, first, write an “easy” question and also write up “answers”. Pretend you are writing the exam. An easy one would be 1-2 sentences for example. Once you understand the concept, write a moderately difficult one. 2-3 sentences. By that time, you should understand it enough where you can make a difficult question; or as the OP put it, “wordy”. These are your scenario based ones. If you can make it to that level, you would have “LEARNED” the topic instead of memorizing it. Which again, UNDERSTANDING it will get you to the holy grail of pass at 100. There was one part about “tricky” questions. What you most likely experienced is the “questions are seeming like they are getting harder and impossible to answer”. That was a GOOD thing. When you are taking the exam, you WANT the questions to get progressively harder. It will mean you are passing. My mentoree, after he passed, told me about he was sure that he was going to fail because the last few questions just seemed impossible and he felt like he was guessing.
2 likes • 6d
I am reading this now. Good stuff.
Exam Strategy Guide: Using Keyword Relationships to Select the Correct Answer
This guide teaches you how to use keywords, qualifiers, semantic relationships, and logical connections to increase the probability of selecting the correct answer on certification exams such as CISSP, Security+, CCSK, ISO, ITIL, and other exams.
1 like • 6d
I am working on this.
1-10 of 89
@alton-butler-7209
Just wanting to learn and pass the CISSP.

Active 9h ago
Joined Jul 7, 2024
Powered by