Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

9 contributions to CISSP Study Group
Practice Question
A ransomware attack has hit your organization. Encrypted files have disrupted critical business functions. You’ve isolated the infected systems, notified leadership, and begun forensic analysis. The CEO is demanding immediate restoration. Backups are available but untested. What is the BEST next action? A. Begin restoration from backups immediately. B. Pay the ransom to recover data quickly. C. Validate the integrity of backups before starting restoration. D. Rebuild affected systems from scratch using original install media.
1 like • May 25
C
Practice Question
During an internal audit, your team discovers several critical systems were excluded from the last vulnerability scan. The scanning tool was configured manually, and the administrator forgot to include new subnets. Management wants assurance that this oversight won’t happen again. What is the BEST step to take? A. Assign vulnerability scanning responsibilities to a more experienced team member. B. Increase scan frequency to weekly instead of monthly. C. Integrate subnet discovery automation into the scanning workflow. D. Outsource vulnerability management to a third party.
1 like • May 25
C
Practice Question
An employee at a large enterprise has moved to a new department. Their new role does not require access to the project management system used in the previous department. However, access is still active. What principle has been violated and what should the IAM team implement to prevent similar issues? A. Principle of Least Privilege; Implement RBAC with periodic access reviews. B. Separation of Duties; Require dual approval for role changes. C. Principle of Accountability; Require stronger authentication methods. D. Need to Know; Use SSO to streamline access control.
1 like • May 25
A
Levels of Capability Maturity Model (CMM)
Anyone found a good mnemonic for remembering the order for the levels of the capability maturity model? I keep mixing them up in test questions. Initial stage I get but get stuck mixing the repeatable, defined, and managed order
Practice Questions
Which of the following is most helpful in applying the principle of LEAST privilege? A. Establishing a sandboxing environment B. Setting up a Virtual Private Network (VPN) tunnel C. Monitoring and reviewing privileged sessions D. Introducing a job rotation program
2 likes • May 21
C
1-9 of 9
Ariela B
2
10points to level up
@ariela-berstein-6024
Hello

Active 44d ago
Joined May 3, 2025
Powered by