Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CISSP Study Group

1.9k members • Free

8 contributions to CISSP Study Group
CISSP Practice Question (Domain 8: Software Development Security)
A development team integrates a generative AI coding assistant that was trained on public repositories. The tool accelerates feature delivery but occasionally references deprecated libraries. Legal warns that AI-generated code may contain license violations or expose proprietary logic if the model was trained on leaked internal code. What should the security manager do FIRST? A. Engage legal counsel to review the AI vendor's training data sources and contractual indemnification clauses B. Implement software composition analysis (SCA) and require all AI-generated code to be digitally signed before commit C. Restrict the AI tool's access to internal repositories and enforce output review through secure-coding peer validation D. Retrain or fine-tune the AI model using only vetted, license-compliant code from approved sources
0 likes • 10d
A is looking to find a legal loophole; although it is a good option, it goes against the ethics code of ISC2. All it is trying to see is if they are liable, but ethically they know there is an issue, and as an ISC2 member, we need to advise based on ethics first and liability second.
0 likes • 9d
@Vincent Primiani I see it now, and I agree that A is the correct answer. What initially tripped me up was the wording “was trained”, which implies the training activity has already occurred, combined with “may contain license violations or expose proprietary logic”, which raised an immediate ethical red flag for me. My instinct was to treat that as confirmed wrongdoing and therefore move straight to containment controls. On reflection, the key word is “may”. From an ISC2 ethics perspective, we are dealing with suspected but unconfirmed harm, not established misconduct. Acting ethically in that situation means first establishing the facts and the organisation’s legal exposure, including training data sources and indemnification, before determining appropriate controls. With that framing, engaging legal counsel to understand liability and risk ownership is the correct FIRST step, and technical or operational controls would follow once the risk posture is clear.
Passed the CISSP Exam @ 132 Questions
I took and passed the CISSP exam yesterday, Friday May 16th, with 17 minutes to spare! I didn't take this exam alone. I walked into the exam hall with a virtual tribe of individuals lifting me on their shoulders. Their confidence in me, dispelled all of my fears and anxiety. Sitting in front of the examination computer, the questions seemed clear to me, even if my fundamentals may have been a bit fuzzy. I would not have passed the exam without the support of this Skool platform, our CISSP Community Study Group (CSG) and the personal connections that I have made via the study groups. Here is my attempt to thank everyone. If I missed someone, please attribute it to my excitement. @Christopher Schneider for introducing me to this platform, @Rebecca Kirk for suggesting that we form a Community Study Group(CSG), @Vincent Primiani for providing the platform, @Fouad Ahmed for motivational support and lots of great documents, @Shane Symons for supporting the group, our CSG members: @Annette Corona @Timilehin Ajibade @Maurice Lightfoot @Taiye Olorundare @Stan Lyubarskiy @Tahjar R @Mario Rasathurai @Reggie Johnson, @Randy Rempel. Special thanks to @Venkat Ayyer @Babur Farooq, @Peter Marie, who passed but continue to support the CSG and @Jolian Stephens @Martín Figueroa for the late night Quantum Question reviews. There are so many more..... My main resources: Original Study Guide: Nineth and Tenth Editions (Wiley Test Bank too)
1 like • May '25
Well done - so glad for you
95 Questions only.
So I wrote my exam on Tuesday in NZ and thought I failed as I only answered 95 questions. Then received my notice to say I passed. This was a great relief as, based on what I understood, is if you answer less than 100 questions, it would indicate you failed. So if anyone else who does not get to 100 questions, do not panic until you have received your confirmation 😁.
1 like • May '25
@Claudie Aldridge The group is great and I feel underutilised
Practice Question
You are reviewing the results of a vulnerability scan of your organization's network. The scan has identified several high-risk vulnerabilities. Due to limited resources, you cannot immediately remediate all of the vulnerabilities. What is the MOST appropriate approach to prioritize remediation efforts? A. Remediate the vulnerabilities that are easiest to fix first, regardless of their potential impact. B. Remediate the vulnerabilities that are most commonly exploited by attackers, based on threat intelligence and vulnerability statistics. C. Remediate the vulnerabilities that pose the greatest risk to the organization's critical assets and business operations. D. Remediate the vulnerabilities that were discovered most recently, as these are likely to be the most current threats.
1 like • Feb '25
I believe the answer is B based on a risk matrix. C could be the most critical but could have the lowest probability. B highest probability and medium risk makes it higher in the matrix. A & D eliminated as the would be the lowest on the matrix
Practice Question
Your organization is implementing a new cloud-based Security Information and Event Management (SIEM) system. You need to ensure that the SIEM effectively detects and alerts on security incidents. Which of the following is the MOST important step in this process? A. Configuring the SIEM to collect logs from all available sources, including network devices, servers, and applications. B. Developing and implementing use cases that are tailored to the organization's specific threat landscape and business requirements. C. Training the security team on how to use the SIEM system to investigate and respond to security incidents. D. Regularly testing and tuning the SIEM system to ensure that it is effectively detecting and alerting on real security incidents.
0 likes • Feb '25
I would say C as you can have the best system in the world and if no one knows how to use it then it will sit on the shelf and do nothing. Secondly a well trained team will be able to set up the SIEM correctly from scratch knowing fully why they are getting the logs in the first place.
1-8 of 8
Shane Symons
2
7points to level up
@shane-symons-5543
Based in Auckland and passed my CISSP in April 2025

Active 8d ago
Joined Jan 13, 2025
Auckland
Powered by