Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

CISSP Study Group

1.5k members • Free

The Blueprint

93 members • Free

15 contributions to CISSP Study Group
CISSP Practice Question – Identity & Access Management
An enterprise is moving to a hybrid cloud model and wants to centralize user authentication across on-premises systems and multiple SaaS providers. The solution must support single sign-on (SSO), enforce multi-factor authentication (MFA), and minimize administrative overhead for provisioning and deprovisioning accounts. Which of the following approaches BEST meets these requirements? A. Deploying Kerberos across all environments, including the SaaS providers B. Implementing a Security Assertion Markup Language (SAML)–based federation with an identity provider C. Using RADIUS servers for all authentication requests to centralize credential management D. Requiring each SaaS provider to integrate directly with the corporate LDAP directory
3 likes • 2d
Kerberos is for internal service management primarily (A) Radius is for remote network monitoring (C) You don't want to have multiple vendors directly integrated to your corporate directory (D) So B is left, and using multiple suppliers you want some sort of standard, so B it is
Practice Question – Security Models
You are designing a system for a law firm that represents multiple competing corporations. The system must: - Prevent lawyers from accessing case files of competing clients - Ensure paralegals can enter data but only senior attorneys can approve filings - Maintain confidentiality of client records Which combination of models is most relevant here? A. Bell–LaPadula and Biba B. Clark–Wilson and Brewer–Nash C. Bell–LaPadula and Clark–Wilson D. Brewer–Nash and Biba
1 like • 3d
Point one requires a chinese Wall, so it's Brewer Nash, which means B or D. Then point two requires different levels of authority, Biba is about maintaining integrity and although it has security levels it doesn't enforce separation of duties. Clark Wilson does, so B is looking good. Now the last point maintaining confidentiality, Clark Wilson is an integrity model but brewer nash is confidentiality so it's B.
CISSP Practice Question – Software Development Security
A development team is adopting a secure software development lifecycle (SDLC). The security manager wants to ensure that vulnerabilities are identified before code is executed, but also wants to minimize cost and disruption to developers. Which of the following activities BEST meets this requirement? A. Static application security testing (SAST) B. Dynamic application security testing (DAST) C. Fuzz testing D. Penetration testing
3 likes • 8d
DAST is run on the running application so fails the before code is executed condition. Same for fuzz testing, pen testing less so but is more focused on exploiting a single vulnerability and pivoting from that. So A - static code review
A big thank you to May
A big thank you to May Brooks-Kempler for sharing her expertise in today’s Masterclass, and to everyone in our community who joined and made it a success. We’re glad we could bring you this opportunity to learn directly from one of the best. Stay tuned for more exciting collaborations with May! 🙏 Please join us in thanking May in the comments. Let us know your biggest takeaway from the session.
A big thank you to May
2 likes • 10d
Thanks to May for the session and Vincent for sorting. Hoping those questions are representative because it was a great confidence booster coming top :)
CISSP Practice Question – Incident Response (Hard)
During a security investigation, the incident response team discovers that an attacker has gained persistent access to a critical application server. The attacker appears to be moving laterally inside the network, but the system also supports customer transactions in real time. What is the MOST important action for the incident response team to take FIRST? A. Contain the compromised server to prevent further lateral movement while maintaining business continuity. B. Notify senior management and legal counsel to prepare for potential disclosure obligations. C. Shut down the compromised server immediately to stop the attacker from exfiltrating additional data. D. Begin collecting forensic images of the server for evidence preservation.
1 like • 10d
We can rule out C we don't want to kill off the customer service, we can rule out B as we don't know if any customer data has been compromised yet. So A or D. I'd want to stop things getting worse so I'd do A then D, answer is A
1-10 of 15
Justin Craigon
2
4points to level up
@justin-craigon-5642
Virtual CISO / Security consultant at BT

Active 1d ago
Joined Jul 14, 2025
Powered by