Activity
Mon
Wed
Fri
Sun
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
What is this?
Less
More

Memberships

CyberMAYnia CAREER

180 members • Free

CISSP Study Group

1.8k members • Free

24 contributions to CISSP Study Group
CISSP Practice Question (Domain 6: Security Assessment and Testing)
A financial institution uses continuous control monitoring to support regulatory examinations. During a supervisory review, regulators challenge whether reported control effectiveness constitutes “reasonable assurance,” given that testing criteria, thresholds, and exception handling are defined by the same team operating the controls. Leadership wants defensible assurance without dismantling automation. What is the MOST appropriate action to take NEXT? A. Rotate control owners periodically to reduce familiarity bias B. Establish independent assurance criteria and validation over monitoring logic C. Increase sampling depth and testing frequency across automated controls D. Supplement dashboards with annual external audit attestations Come back for the answer tomorrow, or study more now!
0 likes • 17h
B looks more accurate with independent assurance
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A regulated organization designs a system where business users submit high value transactions through an application, while a separate service validates and commits them. Auditors later find administrators could bypass the application and update records directly in the database. Management wants assurance this cannot occur again. What is the MOST appropriate architectural control to implement NEXT? A. Stronger privileged user authentication and session recording B. Mandatory access control enforced at the database layer C. Constrained interfaces with enforced well formed transactions D. Increased database activity monitoring and alerting Come back for the answer tomorrow, or study more now!
1 like • 2d
C is appropriate with constrained interface
CISSP Practice Question (Domain 7: Security Operations / Incident Response & Legal Coordination)
During an active breach investigation, the incident response team discovers indicators suggesting a third party service provider may be the initial intrusion vector. Legal warns that premature notification could expose the company to liability, while operations wants immediate coordination to contain spread. What is the MOST appropriate action to take NEXT? A. Notify the service provider immediately with full technical findings B. Isolate affected integrations and preserve evidence before notification C. Escalate directly to law enforcement to avoid vendor disputes D. Delay all action until legal approves external communication Come back for the answer tomorrow, or study more now!
0 likes • 2d
B will more appropriate to contain before notify
CISSP Practice Question (Domain 2: Asset Security / Data Governance)
An enterprise deploys agentic AI systems that autonomously collect data from internal systems and external sources to answer executive queries. Over time, agents begin retaining intermediate data and derived insights to improve future performance. Legal cannot determine what regulated data is being stored or reused. Leadership wants minimal friction. What is the MOST appropriate action to take FIRST? A. Encrypt all agent retained data using enterprise key management B. Perform a data inventory and classification of agent memory and outputs C. Restrict agents to real time queries with no local persistence D. Update contracts with AI vendors to address derived data ownership Come back for the answer tomorrow, or study more now!
1 like • 4d
B looks appropriate as data classification definitely needed
CISSP Practice Question (Domain 1: Security and Risk Management / Emerging Technology Governance)
An organization deploys agentic AI systems that autonomously query external sources, make decisions, and trigger actions across business workflows. In one case, an agent exceeds its intended authority by chaining actions across systems without human approval. Leadership wants innovation but defensible governance. What is the MOST appropriate control to establish FIRST? A. Continuous monitoring of agent activity with real time alerting B. Strong authentication and API rate limiting for agent actions C. Clearly defined authority boundaries and risk ownership for agents D. Periodic audits of agent decisions and outcomes Come back for the answer tomorrow, or study more now!
1 like • 5d
C looks more appropriate with boundary set and ownership define
1-10 of 24
Dj Sahoo
3
25points to level up
@dj-sahoo-9937
Dj

Active 6h ago
Joined Dec 12, 2025
Powered by