Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

Muslims By Heart

1.3k members • Free

CISSP Study Group

1.9k members • Free

10 contributions to CISSP Study Group
The Beast has been conquered.
They call the CISSP the "Gold Standard" for a reason. It isn't just an exam; it is a mental wave where every question sends you into an imaginary, real-life scenario. After 3 hours and 150 questions, I am thrilled to announce that I have officially passed!
The Beast has been conquered.
1 like • 12d
Congrats! @Harrison Efijemue
Passed CISSP Exam!
I am excited to share that I have provisionally passed the CISSP yesterday; 100Qs, 1st attempt. 3 months of study, effort, time and discipline paid off, I took a winded path to the CISSP, took the CC in October, then SSCP in November and CISSP this December. Many thanks to this Community, couldn’t have done it without you’ll, the study sessions, the May Brooks strategies; came in clutch!Thanks for putting this together @Vincent Primiani. I’ll certainly be lurking around this community and help out where I can. Preciate you all!
1 like • Dec '25
@Allison Regan Thanks! I think focusing on mindset and careful reading, most questions are tricky, so always try to thread wih caution. The OSG is dry but absolutely foundational. Practice questions help (I had LearnZapp, the Destination Cert App and a few weeks before exam I bought the QE Exam Practice), but don’t chase the scores; use them to understand why answers are right or wrong. QE felt closest to the real exam I think. Slow down, avoid rushing, and sit with your choice for a few seconds before locking it in. Consistency over time mattered more than cramming in my humble opionion.
CISSP Practice Question (Domain 4: Communication & Network Security / Zero Trust Architecture)
An organization adopts a Zero Trust model and removes implicit trust between internal network segments. Shortly after deployment, several business-critical applications experience latency and intermittent access failures. Leadership questions whether the Zero Trust initiative should be rolled back. What should the security architect do FIRST? A. Roll back Zero Trust controls to restore application performance B. Perform a targeted assessment to identify policy enforcement points causing disruption C. Permanently whitelist affected applications to bypass Zero Trust controls D. Escalate the issue to vendors to redesign the Zero Trust architecture
1 like • Dec '25
B
CISSP Practice Question (Domain 3: Security Architecture & Engineering / Cryptographic Key Management)
A global enterprise is transitioning from long-term symmetric encryption keys to an automated key rotation system using hardware security modules (HSMs). During the rollout, application owners express concern that frequent rotation may disrupt legacy integrations and availability. What should the security architect do FIRST? A. Enforce the new key-rotation policy across all systems immediately B. Perform a risk assessment to evaluate availability impact and integration dependencies C. Allow legacy systems to retain long-term keys indefinitely D. Delay implementation until all applications are modernized
3 likes • Dec '25
B
CISSP Practice Question (Domain 6: Security Assessment & Testing / Continuous Monitoring)
An organization replaces periodic vulnerability scans with a continuous exposure-management platform that automatically adjusts risk scores based on real-time threat intelligence. During an internal audit, leadership asks whether this approach still satisfies regulatory expectations for formal security assessments. What should the security manager do FIRST to address this concern? A. Map continuous monitoring outputs to regulatory assessment requirements B. Resume scheduled vulnerability scans to avoid audit findings C. Request written approval from regulators for the new approach D. Disable automated risk scoring and rely on static assessments
2 likes • Dec '25
Option A : but I can see how one might be tempted to choose C.
2 likes • Dec '25
@Burak Ince I think C is not correct because regulators are not design-approval authorities, and asking them for written approval? I doubt that occurs in the real world.
1-10 of 10
Pa Musa Nyassi
3
38points to level up
@pa-musa-nyassi-7989
Software/Cybersecurity Engineer

Active 10d ago
Joined Sep 22, 2025
Powered by