Activity
Mon
Wed
Fri
Sun
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
What is this?
Less
More

Memberships

CISSP Study Group

2k members • Free

15 contributions to CISSP Study Group
CISSP Practice Question (Domain 7: Security Operations)
The night shift SOC analyst reports that the CEO is locked in his office. The physical access control system's AI module misclassified his valid after-hours badge swipe as anomalous and triggered an automated lockdown response. What should you do FIRST? A. Grant the CEO permanent access override authority to bypass automated controls B. Release the lockdown and document the false positive for automated response review C. Escalate to facilities management since physical access is their responsibility D. Disable the automated lockdown capability until the AI classification model is retrained Come back for the answer tomorrow, or study more now!
0 likes • 14d
B.
CISSP Experience Waiver Changes Coming (April 2026)
"Effective April 1, 2026, the list of credentials that satisfy a waiver for one year of the required work experience for CISSP will be reduced. We are providing advance notice of this change for any candidates who are preparing for the CISSP exam and planning to use the current list of credentials to waive one year of the experience requirement. The new list will be applicable to anyone who submits their CISSP certification application on April 1, 2026 and beyond. As a reminder, the experience requirement for CISSP is a minimum of five years cumulative, full-time experience in two or more of the eight domains of the current CISSP Exam Outline. Part-time work and internships may also count towards the experience requirement. Earning a post-secondary degree (bachelors or masters) in computer science, information technology (IT) or related fields may satisfy up to one year of the required experience or you can use a credential from the ISC2 approved list. You cannot, however, use both a degree and a credential to waive two years from the experience requirement." Source, ISC2
1 like • 17d
Thanks for sharing.
CISSP Practice Question (Domain 2: Asset Security)
Your organization trains proprietary AI models using curated datasets purchased from multiple vendors. A vendor notifies you that one dataset was later found to contain data collected without proper consent. The model using this data is already in production. What is your PRIMARY concern? A. The financial loss from purchasing a non-compliant dataset B. Whether the tainted training data can be surgically removed from the model C. Your organization's regulatory liability for processing non-consensual data D. Renegotiating vendor contracts to include data provenance guarantees Come back for the answer tomorrow, or study more now!
1 like • 24d
C , organizatio always is responsible for data, self or buy.
[PASSED] Officially CISSP! Timeline and Endorsement experience
Finally, the "Congratulation" email arrived! I am thrilled to share that my CISSP application has been approved. This journey was intense, but reaching the finish line feels incredible. I wanted to share my timeline and some details about the endorsement process to help those currently waiting. Gratitude First, a huge thank you to this community. The resources, the "I passed" posts, and the technical deep dives shared here were instrumental in keeping me focused. Also, thanks to my study groups and mentors who helped me bridge the gap between "thinking like a manager" and the technical domains. The Endorsement Timeline For those checking their email every 5 minutes (we've all been there), here was my experience: - Provisionally Passed: JAN / 27 - Submission Date: JAN / 29 - Endorsement Method: CISSP Budy - Approval Received: Today! (3 weeks total). The Endorsement Process & Topics The application was straightforward but required precision. I focused my experience description on: - Mapping to Domains: I ensured my job descriptions clearly used the terminology from the 8 domains (e.g., Identity and Access Management, Security Risk Management). - The "Managerial" Lens: Even for technical roles, I highlighted my involvement in policy, risk assessment, and decision-making processes. - Evidence: I had my documentation ready, though the process was smooth as my endorser was also a CISSP in good standing.
1 like • 29d
:)
1 like • 26d
Thank you all for your congratulations. Now, the focus is on CSSP.
CISSP Practice Question (Domain 5: Identity and Access Management)
A global enterprise discovers that terminated employees in acquired subsidiaries retain active VPN credentials an average of 45 days post-termination. HR blames IT for slow deprovisioning; IT blames HR for delayed termination notifications. What should you address FIRST? A. Implement automated identity lifecycle management to eliminate manual delays B. Establish a unified offboarding SLA with defined handoff triggers between HR and IT C. Deploy continuous access certification reviews to catch orphaned accounts D. Require subsidiary IT teams to run weekly active directory reconciliation reports Come back for the answer tomorrow, or study more now!
1 like • Feb 19
B, this first
1-10 of 15
Aykar Gil
3
35points to level up
@aykar-gil-5244
Aprendiz Tecnológico - CISSP

Active 12d ago
Joined Feb 5, 2026
Powered by