Activity
Mon
Wed
Fri
Sun
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
What is this?
Less
More

Memberships

CISSP Study Group

1.8k members • Free

17 contributions to CISSP Study Group
CISSP Practice Question (Domain 5: Identity and Access Management)
After a merger, two companies federate identity systems to allow cross access to shared applications. An incident later reveals one company’s disabled accounts remained active in the partner environment. Both sides claim the other owns deprovisioning. What is the MOST appropriate control to establish FIRST? A. Enforce shorter session timeouts across federated applications B. Implement continuous access monitoring with anomaly detection C. Define authoritative identity ownership and revocation responsibility D. Require periodic manual access recertification for all shared users Come back for the answer tomorrow, or study more now!
2 likes • 2d
C. Define authoritative identity ownership and revocation responsibility is the MOST appropriate control to establish FIRST. Policy/Goverance is always before Implementation. The establishment of contractual responsibilities are required before any technical controls - without them you have the how but not the who - who is accountable?
Masterclass with May Brooks on the 11th! 7PM UAE
We’re excited to invite the Study Group to another masterclass with May Brooks on the 11th, 7PM UAE These sessions have been a great opportunity to go deeper on key concepts and get May’s perspective and corrections in real time. As always free for Study Group members, you can sign up here. Looking forward to seeing you there!
Poll
38 members have voted
1 like • 10d
Is it the 1st or the 11th?
CISSP Practice Question (Domain 1: Security and Risk Management)
Senior leadership wants to launch a new customer analytics platform that processes regulated personal data. The CISO identifies control gaps that exceed the organization’s stated risk appetite, but executives are pushing for speed to market. What is the MOST appropriate action for the CISO to take NEXT? A. Document the risk and accept it to support business objectives B. Implement compensating controls within the security team C. Escalate the risk to senior management for formal risk acceptance D. Delay the project until all identified risks are fully mitigated Come back for the answer tomorrow! Study more now at CISSP.app
4 likes • 12d
C Escalate the risk to senior management for formal risk acceptance. The important statement in this scenario is that “The CISO identifies control gaps that exceed the organization’s stated risk appetite”, when the risk exceeds the risk appetite of the organization it is imperative that executive management is informed and they make the final decision to formally except the risk - or maybe even decide to delay the release to market - but either way it’s an executive management decision/ not the CISO. Applying compensating controls could still leave gaps that exceed the risk appetite of the organization, which is outside of the CISO’s authority to accept. The CISO making the decision could leave the CISO personally liable & the organization negligent.
CISSP Practice Question (Domain 7: Security Operations / Evidence Handling & Logging)
After a suspected insider incident, system logs from multiple servers show inconsistent timestamps and missing entries. Legal counsel advises that the organization may face litigation. Operations wants logs centralized immediately to restore visibility. What should the security manager do FIRST? A. Centralize all logs immediately to improve operational monitoring B. Preserve existing logs and establish forensic chain of custody C. Reconfigure time synchronization across all affected systems D. Notify law enforcement and external counsel of potential evidence gaps
3 likes • 12d
B Preserve existing logs and establish forensic chain of custody is what the security manager should do first. It is important to always keep evidence preserved, ensuring no contamination, especially in this scenario for Legal counsel advises that the organization may face litigation. Reconfiguring & moving logs compromises the evidence and it would be easily deemed inadmissible in any legal proceedings.
CISSP Practice Question (Domain 6: Security Assessment & Testing / Penetration Testing Governance)
A penetration test identifies a critical vulnerability in a customer-facing application, but exploitation would require downtime during peak business hours. The business requests delaying remediation until the next quarterly release. What should the security manager do FIRST? A. Accept the risk and document the delay as requested B. Perform a risk assessment and present impact analysis to business leadership C. Immediately remediate the vulnerability despite business objections D. Disable the affected application until remediation is complete
6 likes • 15d
B: The security manager needs to perform a risk assessment and an impact analysis to business leadership first. It is their primary responsibility to ensure decisions are driven by risk considerations. No actions should be taken prior to quantifying the risks (understanding likelihood & impact) and presenting to leadership so they can make an informed decision.
1-10 of 17
Pamela Solomon
3
33points to level up
@pamela-solomon-5177
Studying for CISSP – open to study groups and collaboration. Let’s connect and grow in cybersecurity.

Active 1d ago
Joined Aug 30, 2025
WDC
Powered by