Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

CISSP Study Group

1.9k members • Free

12 contributions to CISSP Study Group
CISSP Practice Question (Domain 1: Security and Risk Management)
An organization's CISO discovers that a third-party SaaS vendor processing customer PII has been acquired by a foreign company. The acquiring company is headquartered in a jurisdiction with government data access laws that conflict with the organization's regulatory obligations under GDPR. The vendor contract has 18 months remaining. What should the CISO do FIRST? A. Invoke the contract's termination-for-convenience clause and begin immediate vendor transition planning B. Conduct a risk assessment to evaluate the change in data sovereignty exposure and regulatory compliance impact C. Require the vendor to migrate all customer data to data centers located within approved jurisdictions D. Notify the Data Protection Authority and affected customers of the potential cross-border data transfer Come back for the answer tomorrow, or study more now!
0 likes • 3d
B
0 likes • 4h
B
CISSP Practice Question (Domain 5: Identity and Access Management)
A global enterprise implements a zero-trust architecture requiring continuous authentication and authorization. During an incident investigation, security analysts discover that a compromised service account with high privileges has been making API calls from multiple geographic locations simultaneously. The account uses certificate-based authentication with a valid certificate that won't expire for 18 months. What is the MOST effective immediate containment action? A. Revoke the certificate through the Certificate Authority's Certificate Revocation List (CRL) B. Disable the service account in the identity provider C. Implement IP-based geo-fencing to block requests from unauthorized locations D. Rotate the account credentials and force re-authentication Come back for the answer tomorrow, or study more now!
0 likes • 4h
B
CISSP Practice Question (Domain 4: Communication and Network Security / Trust Boundaries & Attribution)
A global enterprise uses shared network infrastructure to support multiple business units with different regulatory obligations. During an investigation, encrypted internal traffic prevents determining which unit originated a noncompliant data transfer. Network design intentionally avoided segmentation to preserve agility. What is the MOST appropriate architectural control to introduce FIRST? A. Decrypt internal traffic at centralized inspection points B. Implement logical network zoning aligned to business and regulatory boundaries C. Increase application level logging to compensate for network opacity D. Require all business units to use separate encryption keys Come back for the answer tomorrow, or study more now!
0 likes • 4h
B
CISSP Practice Question (Domain 8: Software Development Security)
A development team integrates a generative AI coding assistant that was trained on public repositories. The tool accelerates feature delivery but occasionally references deprecated libraries. Legal warns that AI-generated code may contain license violations or expose proprietary logic if the model was trained on leaked internal code. What should the security manager do FIRST? A. Engage legal counsel to review the AI vendor's training data sources and contractual indemnification clauses B. Implement software composition analysis (SCA) and require all AI-generated code to be digitally signed before commit C. Restrict the AI tool's access to internal repositories and enforce output review through secure-coding peer validation D. Retrain or fine-tune the AI model using only vetted, license-compliant code from approved sources
0 likes • 4d
A-this is the only governance option.
Passed!
PASSED. Today I passed at the first try after studying hard!! To help me pass I did the research and did Many exam questions using this app but also 2 different apps. In Total more than 2000 questions. Thanks for your input !!
1 like • 4d
Congrats!
1-10 of 12
Naashon Zalk
1
1point to level up
@naashon-zalk-2309
Cyber Security Consultant (GRC) | ISO 27001 Lead Implementer |

Active 4h ago
Joined Jan 26, 2026
Powered by