Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
What is this?
Less
More

Memberships

CISSP Study Group

2.1k members • Free

109 contributions to CISSP Study Group
CISSP Practice Question (Domain 2: Asset Security)
A business unit requests permanent retention of all customer transaction records "in case we ever need them." Legal has not issued a hold, and the current retention schedule requires deletion after seven years. As the data owner's advisor, what is the BEST response? A. Honor the request since longer retention reduces legal discovery risk B. Enforce the existing retention schedule and require a formal exception with risk acceptance C. Migrate the records to cold storage to balance cost and accessibility D. Defer to Legal before taking any action on the records Come back for the answer tomorrow, or study more now!
1 like • 9d
I go for C. Because i’m Confused about B. Honor the retention period and need for an exception? I would expect an exception if retention period is longer than stated in the policy. To keeps records longer than the policy States, I would advise an exception and cold storage to reduce cost and accessibility.
CISSP Practice Question (Domain 4: Communication and Network Security)
Your organization is migrating critical workloads to a hybrid cloud. The network team proposes extending the existing flat internal VLAN into the cloud VPC to simplify routing and accelerate the cutover. As the security architect, what is the BEST response? A. Approve, provided IPsec tunnels encrypt all inter-site traffic B. Require micro segmentation aligned to a Zero Trust reference architecture C. Mandate east-west IDS sensors before the migration begins D. Defer until a cloud access security broker (CASB) is deployed Come back for the answer tomorrow, or study more now!
1 like • 11d
B. Implementing B will also prevent east-west movement. D. As it concerns critical workloads, deference will impact business goals too much. Encryption will probably be much slower then segmentation.
CISSP Practice Question (Domain 4: Communication and Network Security - Zero Trust)
Your company adopts Zero Trust and replaces the legacy VPN with identity-based access for remote workers. Six weeks in, helpdesk tickets spike: users complain that access to internal apps breaks unpredictably throughout the day. What is the MOST likely root cause? A. Insufficient bandwidth at the identity provider B. Continuous authentication is re-evaluating trust signals and revoking sessions C. DNS resolution failures between the client and the policy enforcement point D. Certificate pinning conflicts with the new SSO provider Come back for the answer tomorrow, or study more now!
1 like • 16d
B. Bases on deduction. A would result in slower connecties. C would result in permanent connecties loss. D. Would also result in permanent loss. But Still not sure why B would result in unpredictable behaviour.
CISSP passed
Hi Everyone, I’m proud to share that I have provisionally passed the CISSP CAT exam today! It will definitely test your fitness, but it is all worth it. Huge respect to everyone here. For those who are still traveling, keep going; it will be worthwhile, and you will reach the end. Here's my personal strategy for exam prep. Note: This is still required reading: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Sybex Study Guide). Wave 1—Setup 1. Join https://www.skool.com/cybersecurity-study-group (obviously, you're here already 🙂). 2. Subscribe to https://cissp.app/ 3. Buy the book: https://leanpub.com/cissplastmile#about 4. Download and print out: https://destcert.com/cissp-mindmaps/ Wave 2—Study 1. Watch: https://www.youtube.com/watch?v=5BnhDVOnzmg 2. Watch: https://www.youtube.com/watch?v=gKe88tIeVYo 3. Watch in full: https://www.youtube.com/watch?v=aLIFzIBNM_8&list=PL7XJSuT7Dq_XPK_qmYMqfiBjbtHJRWigD 4. Watch in full: https://www.youtube.com/watch?v=hf5NwUSEkwA&list=PLZKdGEfEyJhLd-pJhAD7dNbJyUgpqI4pu 5. Go through the mind maps daily. 6. Read the book. 7. Use cissp.app and practice a minimum of 25 questions each day (three-month prep period). a. Check the gap analysis summary every 100 questions at the latest and go read up on your weak areas. Wave 3—Last month 1. Watch https://www.youtube.com/watch?v=5BnhDVOnzmg 2. Watch https://www.youtube.com/watch?v=gKe88tIeVYo
2 likes • 17d
Discipline pays!!! Well done !!
CISSP Practice Question (Domain 7: Security Operations - Cloud Incident Response)
A developer's leaked API key is used to spin up 400 cryptocurrency mining instances in your AWS account overnight. The monthly bill is now $180K over budget. What should the incident responder do FIRST? A. Terminate all unauthorized instances to stop the financial bleeding B. Rotate the compromised API key and disable the associated IAM user C. Snapshot the instances and preserve CloudTrail logs for forensic analysis D. Contact AWS billing to request a fraud-related credit Come back for the answer tomorrow, or study more now!
2 likes • 18d
B. contain the issue first by making sure the key is unusable and disabling the user account. A does not prevent new instances being started. C does not stop the bleeding, although it might be a second action. D good luck!
1-10 of 109
Ivo Mulders
4
34points to level up
@ivo-mulders-1100
ISO Netherlands CISM, CISSP, (aspiring) AAISM

Active 7d ago
Joined Oct 28, 2025
Netherlands
Powered by