Activity
Mon
Wed
Fri
Sun
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
What is this?
Less
More

Memberships

CyberMAYnia CAREER

198 members • Free

CISSP Study Group

1.8k members • Free

16 contributions to CISSP Study Group
CISSP Practice Question (Domain 2: Asset Security / Data Ownership & Accountability)
A company migrates sensitive business data to a shared analytics environment used by multiple departments. Data accuracy issues emerge, but no single group can authorize correction because ownership is unclear. Leadership wants faster decisions without creating a centralized bottleneck. What is the MOST appropriate governance action to take FIRST? A. Assign a single enterprise data steward for all analytics data B. Define data ownership and decision authority at the dataset level C. Implement stricter change control over analytics transformations D. Increase audit logging for data modifications and access Come back for the answer tomorrow, or study more now!
0 likes • 5h
B. Solves for ownership at dataset level, which decentralizes authority (satisfying leadership's bottleneck request) while ensuring every piece of data has a clear POC (governance) if and when corrections are required.
CISSP Practice Question (Domain 6: Security Assessment and Testing)
A company uses red team exercises to validate detection and response capabilities. After several successful simulations, leadership concludes incident readiness is high. An independent review finds that scenarios are reused and defenders have begun anticipating tactics. Management wants realistic assurance without increasing test frequency. What is the MOST appropriate change to make? A. Rotate red team members to reduce defender familiarity B. Introduce threat informed testing with adaptive scenario design C. Increase reliance on automated attack simulation tools D. Separate detection and response teams during exercises Come back for the answer tomorrow, or study more now!
1 like • 1d
B. Although potentially more resource intensive on the Red Team, introducing adaptive scenarios widens the Blue Team's defensive approach, otherwise they would always expect a very similar RT playbook.
CISSP Practice Question (Domain 1: Security and Risk Management / Board Oversight & Accountability)
Following a major security incident, the board asks management to demonstrate that security investments over the past two years were aligned to enterprise risk, not just technical best practices. Metrics show control maturity, but not business impact reduction. What is the MOST appropriate action to take NEXT? A. Map historical security controls to compliance framework requirements B. Reframe security reporting around risk scenarios and loss exposure C. Commission an external benchmark against industry peers D. Increase board level security training and awareness sessions Come back for the answer tomorrow, or study more now!
1 like • 1d
B. Addresses the actual business impact (customer risk/dollar figures) vs technical impact (processes/systems).
CISSP Practice Question (Domain 1: Security and Risk Management / Legal & Governance Edge Case)
A company uses an internal investigation team and outside counsel during major incidents. To reduce email overload, executives begin discussing response strategy and legal risk inside a collaboration platform with auto retention and global search enabled. No breach has occurred yet. What is the MOST appropriate action to take FIRST? A. Disable search and retention features for executive channels B. Move all sensitive discussions to encrypted messaging tools C. Establish formal communication boundaries and privilege handling procedures D. Require legal approval before any executive incident discussion Pssst… CISSP.app
2 likes • 3d
C. Most appropriate first step (considering there is no breach in progress). This addresses a proactive communication alignment for both legal and governance.
Good Morning Future CISSPs!! - Practice Question (Domain 4: Communication and Network Security)
I felt like such a robot 🤖 posting the question this morning. I needed to say hello to all our wonderful members!! Okay, okay, the question... A company deploys a zero trust network where every request is authenticated, authorized, and encrypted. During an incident, investigators cannot reconstruct attack paths because traffic patterns are indistinguishable once inside the fabric. Security wants forensic clarity without weakening zero trust principles. What is the MOST appropriate architectural adjustment? A. Decrypt and inspect all internal traffic at centralized gateways B. Implement per request cryptographic identity and flow labeling C. Increase east west traffic logging at network choke points D. Reintroduce internal trust zones to simplify attribution Come back for the answer tomorrow, or study more now!
1 like • 4d
B. Encryption remains a priority while solving for forensic investigation needs with the use of flow labeling.
1-10 of 16
Francisco Varela
3
43points to level up
@francisco-varela-1249
Hi, I'm Francisco from NJ. 23 years in tech mostly at a service provider. Currently a Network Security Defense Director.

Online now
Joined Jan 2, 2026
Powered by