Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CISSP Study Group

1.9k members • Free

58 contributions to CISSP Study Group
CISSP Practice Question (Domain 8: Software Development Security)
A development team uses an AI-powered coding assistant that suggests code snippets from its training data. The tool recently generated functions containing logic similar to a competitor's proprietary algorithm. What should the security manager do FIRST? A. Conduct a legal review to assess intellectual property infringement risk B. Implement software composition analysis to detect and flag AI-generated code C. Restrict the AI tool's network access and require human review of all outputs D. Retrain the model on the organization's internal codebase only Come back for the answer tomorrow, or study more now!
1 like • 5h
A. Conduct a legal review to assess intellectual property infringement risk ( similarity to a competitor's proprietary algorithm can expose the said risk, risk assessment is sane option to proceed further with C or D- Governance). B. Implement software composition analysis to detect and flag AI-generated code ( soft ware composition analysis is effective for finding root cause but it will come after risk assessment out come- detective/ operational decision). C. Restrict the AI tool's network access and require human review of all outputs ( restriction ( risk treatment -avoidance) prior to A (risk assessment) is contrary to security governance alignment with business objectives though human review of AI is important - AI Governance). D. Retrain the model on the organisation's internal code base only ( undermine performance of model without accessing external code repositories / libraries). Identify → Assess (legal/risk) → Decide → Treat/Mitigate
CISSP Practice question
Dorian is a security professional for a healthcare corporation.Due to HIPAA (Health Insurance Portability and Accountability Act) regulations, Dorian must find methods to protect any PHI (public health information). Which security approach will BEST minimize PHI loss from a data breach?
Poll
20 members have voted
0 likes • 1d
Loss of encrypted data ( key and encryption algorithm are strong and secure) is not considered as breach ( exposure of confidentiality) and not apllicable to breach notification (GDPR- safe harbour). Therefore encryption is the best choice but E2EE is only effective for data in transit ehich creates a little ambiguity. Moreover, if encrption is not in the given options, then Data Collection Base Line (minmum collection) is effective measure will BEST minimize PHI loss from a data breach. That is why CISSP want to focus on question in hand rahter establishing resemblance with previous question as a minimal change in question wording or answer options will chnage the context entirly like Diffusion in encryption influence of single plaintext bit change across many ciphertext bits.
Practice Questions
What is the MOST important element when considering the effectiveness of a training program for Business Continuity (BC) and Disaster Recovery (DR)? A. Management support B. Consideration of organizational need C. Technology used for delivery D. Target audience
0 likes • Jan 3
if the question is changed by one word What is the MOST important element when measuring the effectiveness of a training program for Business Continuity (BC) and Disaster Recovery (DR)? A. Management support B. Consideration of organizational need C. Technology used for delivery D. Target audience
0 likes • 1d
for measuing effectiveness : B- Directly tied to effectiveness. If training aligns with business risks, BIA results, and recovery priorities, it is effective.
CISSP Practice Question (Domain 1: Security and Risk Management)
A multinational organization is expanding into a region with strict data localization laws while maintaining its global incident response capability. The CISO must balance compliance with operational effectiveness. What is the MOST appropriate first step? A. Deploy regional SOC infrastructure to process security data locally B. Conduct a regulatory impact assessment on cross-border data flows C. Negotiate data transfer agreements with the host country's authority D. Implement encryption for all security telemetry leaving the region Come back for the answer tomorrow, or study more now!
2 likes • 2d
A. Deploy regional SOC infrastructure to process security data locally ( appropriate step aligned with strictness of data localization laws but it will come after B if balance tilts towards it - Governace has priority over operational decsions). B. Conduct a regulatory impact assessment on cross-border data flows ( sane first step for balancing compliance and global operational effectivness - legal/regulatory understanding must precede technical controls.). C. Negotiate data transfer agreements with the host country's authority ( it may considered after B if feasible - legality required before negotiating). D. Implement encryption for all security telemetry leaving the region ( good step for data confidentiality and integrity but localization not permit data transfer in either form). Legal → Governance → Risk → Operations → Technical
Kelly new video for CISSP
https://www.youtube.com/watch?v=gKe88tIeVYo
0 likes • 2d
it is regarding the actual mindset required for CISSP
1-10 of 58
Hassan Na
4
43points to level up
@hassan-hassan-4557
CISSP aspirant, ISC2 CC

Active 5h ago
Joined Dec 7, 2025
Powered by