Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

CyberMAYnia Club

41 members • Free

CISSP Study Group

1.5k members • Free

13 contributions to CISSP Study Group
CISSP Practice Question – BC/DR
A financial institution is designing its disaster recovery strategy. Management states that after a disruption, customer-facing services must be restored within four hours, and no more than 30 minutes of customer transaction data can be lost. Which of the following BEST describes these requirements? A. RTO = 30 minutes, RPO = 4 hours B. RTO = 4 hours, RPO = 30 minutes C. RTO = 4 hours, RPO = 4 hours D. RTO = 30 minutes, RPO = 30 minutes
0 likes • 1h
B actually - the other way round :) Recovery Point Objective of 30mins , Recovery Time Objective of 4h ?
I passed the CISSP on July 26, 2025
Hi Everyone! I received the following message from ISC2 three days after writing the CISSP exam, but I haven’t been able to update the platform until now due to urgent family matters. The message read: "Congratulations! We are pleased to inform you that you have passed the Certified Information Systems Security Professional examination. You have successfully completed the first step toward earning your certification and becoming an ISC2 member..." From my experience, I’ve learned that the key to passing is understanding the core concepts and how they apply in real-world cybersecurity scenarios. Practice tests help, but not as much as truly grasping the principles. Thank you.
0 likes • 2d
Congrats Chris :-)
CISSP Practice Question
Which of the following are all elements of a disaster recovery plan (DRP)? A. Document the actual location of the Offsite Recovery Point (ORP), developing an incident notification procedure, evaluating costs of critical components B. Document the actual location of the Offsite Recovery Point (ORP), developing an incident notification procedure, establishing recovery locations C. Maintain proper documentation of all server logs, developing an incident notification procedure, establishing recovery locations D. Document the actual location of the Offsite Recovery Point (ORP), recording minutes at all Offsite Recovery Point (ORP) planning sessions, establishing recovery locations
0 likes • 3d
B ?
CISSP Practice Question – Security Assessment & Testing
A company’s security team is planning regular vulnerability assessments of its production systems. Management insists that business operations must not be disrupted during these tests. Which of the following approaches BEST meets this requirement? A. Run authenticated vulnerability scans against production systems during business hours. B. Conduct penetration tests against production systems once per quarter. C. Perform vulnerability scans in a staging environment that mirrors production. D. Schedule uncredentialed vulnerability scans of production systems during off-peak hours.
1 like • 4d
C - perform vulnerability scans in staging that mirrors prod.
Practice Question
Question: A multinational corporation is migrating its most critical applications to a hybrid cloud environment. The CIO is concerned about the following risks: - Data exfiltration by malicious insiders at the cloud provider - Inconsistent enforcement of data classification policies across jurisdictions - Difficulty proving compliance during external audits The company already uses encryption, strict IAM controls, and third-party risk assessments. Which of the following security approaches would BEST address the CIO’s concerns? A. Implement tokenization of sensitive data before it enters the cloud environment B. Require the cloud provider to sign a detailed SLA with strong penalties for non-compliance C. Adopt a cloud access security broker (CASB) for centralized visibility and policy enforcement D. Use homomorphic encryption to allow computations on encrypted data without exposing raw data
0 likes • 5d
@Xu Zhai C is the best option as it addresses all concerns. One thing I have noticed about the CISSP is that although one needs to think like a manager, ensuring that lives of individuals are protected, business objectives are met and business does not lose money, are principles one needs to focus on ! Requiring CPs to sign an SLA is positioning the company in a reactive posture (Penalties after the fact). The implementation of CASB would serve as a proactive measure that could also allow for monitoring cloud usage while threats detected can be acted upon before any major loss. Lastly as with most monitoring tool , aggregation of data can provide evidence of compliance if performed.
1-10 of 13
Idris Onimole
2
11points to level up
@idris-onimole-7612
CS Incident Responder - Love learn and share knowledge, find a mentor towards being a Security consultant / Infosec manager. Taking CISSP soon.

Active 1h ago
Joined Sep 14, 2025
ENTP
Prague
Powered by