Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CISSP Study Group

1.8k members • Free

7 contributions to CISSP Study Group
CISSP Practice Question (Domain 5: Identity & Access Management / Privileged Access Controls)
During a quarterly access review, an organization discovers that several DevOps engineers have accumulated multiple privileged roles across different cloud environments due to automated provisioning workflows that never revoked old permissions. No misuse has been detected, but the roles collectively exceed least-privilege requirements and present a potential lateral-movement risk. What should the security manager do FIRST? A. Immediately disable all excessive roles and force users to request access again B. Conduct a risk analysis to understand business impact before removing permissions C. Implement just-in-time privileged access to eliminate standing permissions D. Escalate the issue to HR for potential policy violations
1 like • 22h
B
CISSP Practice Question (Domain 7: Security Operations / Supply Chain Risk)
An enterprise discovers that a widely used third-party monitoring agent embedded in multiple production servers has begun making undocumented outbound connections to an IP range controlled by a subcontractor the enterprise has never engaged. The agent is critical for operational visibility, and disabling it would blind several detection controls. No malicious activity has been confirmed, but threat intelligence reports suggest recent supply chain compromises involving similar agents. What should the security manager do FIRST? A. Immediately isolate all hosts running the agent from the network B. Conduct a rapid supplier risk reassessment and verify the legitimacy of the subcontractor relationship C. Disable the agent across production to eliminate potential exfiltration D. Escalate directly to regulators due to potential third-party data exposure
0 likes • 2d
B
CISSP Practice Question (Domain 1: Security and Risk Management)
A regional bank adopts a new third-party transaction-scoring engine hosted in the cloud. The vendor refuses to provide detailed architectural diagrams but offers recent SOC 2 Type II reports. Executives want rapid deployment, but regulators recently flagged the bank for weak vendor oversight. What is the MOST appropriate next step? A. Require the vendor to provide full network diagrams before integration B. Review and validate the SOC 2 report against the bank’s control objectives C. Conduct a full on-site audit of the vendor’s operations D. Delay onboarding until regulators approve the vendor’s environment
1 like • 4d
B
CISSP Practice Question – Domain 4 (Secure Network Design & Key Management)
A multinational enterprise operates a highly distributed microservices architecture across multiple cloud providers.All traffic between microservices must be encrypted and authenticated. To simplify governance, the company wants a single global certificate hierarchy for all workloads across all clouds and on-prem systems. However, several constraints apply: - Private keys must never leave the host or container where they are created. - Certificate issuance must support auto-scaling, ephemeral workloads, and identity rotation every few minutes. - The environment includes legacy systems that cannot use modern service mesh sidecars. - Security monitoring requires centralized revocation and trust-state visibility across all issuers. Which PKI architecture BEST satisfies these requirements? A. single monolithic root CA issuing certificates directly to all cloud and on-prem workloads. B. Multiple independent PKIs, each cloud provider managing its own root and workload certificates. C. A federated PKI with one offline enterprise root and cloud-specific subordinate CAs, each issuing short-lived, locally generated keypairs. D. Use self-signed certificates generated per workload and synchronize fingerprints centrally for trust verification.
1 like • 6d
C
CISSP Practice Question – Domain 4 (Communication & Network Security)
A global enterprise adopts a strict zero-trust network architecture. All workloads—on-prem, cloud, and containerized—must mutually authenticate before communicating. To comply with regulatory requirements, the company must also maintain full packet-level visibility for threat analysis and incident response. Which solution BEST satisfies all of these requirements simultaneously? A. Deploy full end-to-end TLS between all workloads and rely on IDS/IPS to inspect only metadata and flow logs. B. Use a TLS termination proxy at network choke points and decrypt all internal traffic for inspection before re-encrypting. C. Implement mutual TLS within a service mesh that supports encrypted telemetry export and out-of-band traffic mirroring for deep packet inspection. D. Use host-based agents to perform inline decryption on each workload and send decrypted payload streams to the central IDS via secure channels.
0 likes • 8d
C
1-7 of 7
Ruby Zhou
2
15points to level up
@ruby-zhou-2440
pass! pass! pass!

Active 5h ago
Joined Nov 29, 2025
Powered by