Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CISSP Study Group

1.8k members • Free

3 contributions to CISSP Study Group
CISSP Practice Question (Domain 6: Security Assessment & Testing / Continuous Monitoring)
An organization replaces periodic vulnerability scans with a continuous exposure-management platform that automatically adjusts risk scores based on real-time threat intelligence. During an internal audit, leadership asks whether this approach still satisfies regulatory expectations for formal security assessments. What should the security manager do FIRST to address this concern? A. Map continuous monitoring outputs to regulatory assessment requirements B. Resume scheduled vulnerability scans to avoid audit findings C. Request written approval from regulators for the new approach D. Disable automated risk scoring and rely on static assessments
0 likes • 3h
A. Map continuous monitoring outputs to regulatory assessment requirements ( seems viable option which moving towards what regulator wants in relation to his expections ). B. Resume scheduled vulnerability scans to avoid audit findings ( retrograding action from technological advancement)- contineous monitoring ( zero trust )). snapshot of contious monitoring at any point will suffice periodic scan. C. Request written approval from regulators for the new approach ( regulator approval not always mandatory until explicitly specified as mostly regulator desire output not adopted prcoesses ). D. Disable automated risk scoring and rely on static assessments ( again discourging technogical advacement and automation ).
CISSP Practice Question (Domain 7: Security Operations / Supply Chain Risk)
An enterprise discovers that a widely used third-party monitoring agent embedded in multiple production servers has begun making undocumented outbound connections to an IP range controlled by a subcontractor the enterprise has never engaged. The agent is critical for operational visibility, and disabling it would blind several detection controls. No malicious activity has been confirmed, but threat intelligence reports suggest recent supply chain compromises involving similar agents. What should the security manager do FIRST? A. Immediately isolate all hosts running the agent from the network B. Conduct a rapid supplier risk reassessment and verify the legitimacy of the subcontractor relationship C. Disable the agent across production to eliminate potential exfiltration D. Escalate directly to regulators due to potential third-party data exposure
1 like • 2d
A. Immediately isolate all hosts running the agent from the network ( it will disrupt critical operations) B. Conduct a rapid supplier risk reassessment and verify the legitimacy of the subcontractor relationship ( sane option as no malacious activity established yet) C. Disable the agent across production to eliminate potential exfiltration ( Its running important for detective controls operation) D. Escalate directly to regulators due to potential third-party data exposure ( without establishing incident and exposure, approaching regulator is not justifed)
Question on GDPR - can someone explain me this.
A breach exposes encrypted personal data. The encryption keys are stored securely and were not compromised. Under GDPR, what is the most accurate interpretation regarding breach notification to the supervisory authority? A. Notification is always required, regardless of encryption B. Notification is not required because the data is encrypted C. Notification is required only if there is a high risk to rights and freedoms D. Notification is required only if the data subjects complain
1 like • 6d
A
3 likes • 5d
if 'encrypted data' is breached and key is secure then C is correct under GDPR Article 33
1-3 of 3
Hassan Hassan
2
15points to level up
@hassan-hassan-4557
CISSP aspirant

Active 3h ago
Joined Dec 7, 2025
Powered by