Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CyberMAYnia CAREER

226 members • Free

Builders Lab

508 members • Free

CISSP Study Group

1.9k members • Free

5 contributions to CISSP Study Group
CISSP Practice Question (Domain 7: Security Operations / Incident Response & Legal Coordination)
During an active breach investigation, the incident response team discovers indicators suggesting a third party service provider may be the initial intrusion vector. Legal warns that premature notification could expose the company to liability, while operations wants immediate coordination to contain spread. What is the MOST appropriate action to take NEXT? A. Notify the service provider immediately with full technical findings B. Isolate affected integrations and preserve evidence before notification C. Escalate directly to law enforcement to avoid vendor disputes D. Delay all action until legal approves external communication Come back for the answer tomorrow, or study more now!
2 likes • 27d
B. Isolate affected integrations and preserve evidence before notification. By isolating affected third-party integrations, the team reduces ongoing risk without making premature external disclosures. Preserving evidence ensures the organization can later support legal, regulatory, and contractual actions—especially important when a third party may be involved.
CISSP Practice Question (Domain 1: Security and Risk Management / Emerging Technology Governance)
An organization deploys agentic AI systems that autonomously query external sources, make decisions, and trigger actions across business workflows. In one case, an agent exceeds its intended authority by chaining actions across systems without human approval. Leadership wants innovation but defensible governance. What is the MOST appropriate control to establish FIRST? A. Continuous monitoring of agent activity with real time alerting B. Strong authentication and API rate limiting for agent actions C. Clearly defined authority boundaries and risk ownership for agents D. Periodic audits of agent decisions and outcomes Come back for the answer tomorrow, or study more now!
1 like • 29d
C
CISSP Practice Question (Domain 6: Security Assessment and Testing)
A regulated enterprise relies on continuous automated control testing dashboards for audit readiness. An external auditor notes controls appear effective, but underlying test logic was recently modified by the same team being assessed. Management wants minimal disruption. What is the MOST appropriate action to take NEXT? A. Accept results since controls are continuously monitored B. Perform an independent validation of assessment tools and methods C. Increase testing frequency to offset potential bias D. Document the issue as an accepted audit limitation Study more now!
1 like • Jan 5
B - given that the Management wants minimal disruption.
Introductions
Welcome to the group! Please share what you hope to gain from being here, and for fun, tell us the best piece of advice you've ever received!
1 like • Jan 3
Hello Team, I’m excited to join this group! I discovered this platform while researching CISSP study communities, and I’m looking forward to learning alongside all of you. My goal is to take and pass the CISSP exam by March 26, 2026, and I believe this group will be an invaluable resource to help me stay disciplined and access the materials I need to succeed. Thank you for having me—I’m eager to collaborate and grow with you all! The best advice I have received is "Do what is necessary, not what is convenient.
CISSP Practice Question (Domain 8: Software Development Security)
A product team deploys an AI assisted code generation tool directly into the CI pipeline. Developers report faster releases, but security finds no reliable way to prove which portions of code were human written versus AI generated during post incident review. Leadership values speed and traceability. What is the MOST appropriate control to implement FIRST? A. Require manual peer review of all AI generated code B. Enforce code provenance and artifact attestation in the pipeline C. Limit the AI tool to non production repositories only D. Increase static analysis coverage on all builds Come back for the answer tomorrow, or study more now!
1 like • Jan 3
B - Code provenance and artifact attestation ensure that every piece of code in the build can be traced back to its source (human developer or AI tool), along with cryptographic integrity checks.
1-5 of 5
Ifuemi Sheibu
2
14points to level up
@ifuemi-sheibu-6864
I am looking forward to connect with peers to sharpen my learning capability in preparation to building my professional career.

Active 5h ago
Joined Dec 27, 2025
Powered by