Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
What is this?
Less
More

Memberships

CyberMAYnia CAREER

436 members • Free

CISSP Study Group

2.1k members • Free

146 contributions to CISSP Study Group
CISSP Practice Question (Domain 6: Security Assessment and Testing)
An internal audit reveals that quarterly vulnerability scans are completed on schedule, but 40% of critical findings remain unremediated past SLA. The vulnerability management team reports the metrics as "green" because scans were performed. As the CISO, what is the BEST corrective action? A. Reduce scan frequency until remediation capacity catches up B. Redefine the program metrics to measure remediation outcomes, not scan activity C. Escalate overdue findings directly to system owners' executives D. Outsource remediation to a managed security service provider Come back for the answer tomorrow, or study more now!
1 like • 1d
A. Reduce scan frequency until remediation capacity catches up (Reduce scan frequency until remediation capacity catches up is generally a poor security decision because it increases Mean Time to Detect (MTTD) vulnerabilities and misconfigurations). B. Redefine the program metrics to measure remediation outcomes, not scan activity (As 40% of critical findings remain unremediated which make the detection futile without remediation, therefore redefining the metrics is the best corrective action). C. Escalate overdue findings directly to system owners' executives ( such escalation is not aligned with security governance and will not solve the root cause problem). D. Outsource remediation to a managed security service provider ( Outsourcing remediation changes the delivery model but does not fix measurement, accountability, or risk governance).
Passed the CISSP
I passed the CISSP yesterday. It has been an immense journey and this community has been instrumental and has been great to collaborate and I will continue to do so. You will never feel 100% ready to take this exam, you just have to go for it! I used official study materials to prepare and this community for Q&A which I believe is a great preparation source. Keep pushing, you will get there all that hard work will pay off.
2 likes • 2d
congrats
Question: Domain 1 (Security and Risk Management)
A multinational organization is migrating its data to a third-party cloud provider. The Chief Information Security Officer (CISO) is concerned about maintaining compliance with various international privacy regulations. What is the BEST way to ensure the cloud provider meets the organization’s security requirements? - A. Conduct a point-in-time vulnerability scan of the provider’s infrastructure. - B. Include "right-to-audit" clauses and Require Service Level Agreements (SLAs). - C. Review the provider’s SOC 2 Type II report and audit results. - D. Implement a Cloud Access Security Broker (CASB) to monitor traffic.
1 like • Mar 21
A. Conduct a point-in-time vulnerability scan of the provider’s infrastructure ( Its analogous to SOC 2 Type I report which will not fullfil the future compliance requirement as not cpmprehensive as SOC 2 Type II). - B. Include "right-to-audit" clauses and Require Service Level Agreements (good option for maintaining compliance by inclusion of corporate bindiing through clause and formal legal document as compliance is responsibility of the organization, however, it is complimentary requirement as necessary for governance and continued assurance, but less effecitve to ensure the provider currently meets requirements). - C. Review the provider’s SOC 2 Type II report and audit results ( best for demonstrating security posture assurrance for last 6-12 months and a stanadard report having wide accepatbility for excercise corporate and legal binding to the 3rd party for compliance). - D. Implement a Cloud Access Security Broker (CASB) to monitor traffic ( best practice for security mointoring as futurisitc step but not come before option 'C').
0 likes • 2d
Here I slightly prefer B over C. - B implies continuous monitoring , due diligence + due care and contractual enforcement through SLA - C (even if is a Type 2) the question say "reviewing", so something in the past (and not enforceable in future), The question asks for "maintaining compliance" , this make me think of continuous measures.
CISSP Practice Question (Domain 3: Security Architecture and Engineering)
A vendor proposes a new SaaS platform that processes regulated customer data. Procurement wants to sign by quarter-end, and the vendor's SOC 2 Type II report is six months old. As the security architect, what is the MOST appropriate next step? A. Accept the SOC 2 report and proceed with contract execution B. Require the vendor to complete your standard security questionnaire C. Perform a risk assessment mapped to your control requirements D. Demand a fresh penetration test before signing Come back for the answer tomorrow, or study more now!
1 like • 3d
C
2 likes • 3d
A. Accept the SOC 2 report and proceed with contract execution ( Not appropriate without risk assessment first option 'C' as the SOC 2 Type II report is 6 month old in the rapidly evolving threat land scape). B. Require the vendor to complete your standard security questionnaire (questionnaire may support the assessment process but does not replace a formal risk assessment). C. Perform a risk assessment mapped to your control requirements ( most appropriate next step as secuirty architect to compare old report with your current control requirement aligned with goverance priority over technical control). D. Demand a fresh penetration test before signing ( PT provide point in time specific secuity posture rather over a time span over 6 to 12 months of SoC 2 Type II).
CISSP Practice Question (Domain 5: Identity and Access Management)
A long-tenured engineer has accumulated access across six business units through internal transfers. A recent audit flagged the account as having excessive privileges, but managers insist the access is "needed for cross-functional projects." What should you do FIRST? A. Disable unused entitlements based on the last 90 days of activity logs B. Initiate a formal access recertification with each respective data owner C. Implement a role-based access control model to replace direct grants D. Escalate to HR to enforce a job description review Come back for the answer tomorrow, or study more now!
0 likes • 7d
B
1-10 of 146
Hassan Na
5
278points to level up
@hassan-hassan-4557
CISSP aspirant, ISC2 CC

Active 7h ago
Joined Dec 7, 2025
Powered by