Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Owned by Vincent

CISSP Study Group

1.9k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

OpenAI Study Group

1 member • Free

Share resources, get advice, and connect with peers studying for OpenAI certifications! Join our Study Group and meet fellow professionals today!

Memberships

CyberMAYnia CAREER

226 members • Free

Skoolers

190k members • Free

701 contributions to CISSP Study Group
CISSP Practice Question (Domain 5: Identity and Access Management)
A global enterprise implements a zero-trust architecture requiring continuous authentication and authorization. During an incident investigation, security analysts discover that a compromised service account with high privileges has been making API calls from multiple geographic locations simultaneously. The account uses certificate-based authentication with a valid certificate that won't expire for 18 months. What is the MOST effective immediate containment action? A. Revoke the certificate through the Certificate Authority's Certificate Revocation List (CRL) B. Disable the service account in the identity provider C. Implement IP-based geo-fencing to block requests from unauthorized locations D. Rotate the account credentials and force re-authentication Come back for the answer tomorrow, or study more now!
CISSP Practice Question (Domain 1: Security and Risk Management)
An organization's CISO discovers that a third-party SaaS vendor processing customer PII has been acquired by a foreign company. The acquiring company is headquartered in a jurisdiction with government data access laws that conflict with the organization's regulatory obligations under GDPR. The vendor contract has 18 months remaining. What should the CISO do FIRST? A. Invoke the contract's termination-for-convenience clause and begin immediate vendor transition planning B. Conduct a risk assessment to evaluate the change in data sovereignty exposure and regulatory compliance impact C. Require the vendor to migrate all customer data to data centers located within approved jurisdictions D. Notify the Data Protection Authority and affected customers of the potential cross-border data transfer Come back for the answer tomorrow, or study more now!
1 like • 1d
@Hassan Na **CORRECT ANSWER: B - Conduct a risk assessment** **Why B is Correct:** A risk assessment is the essential FIRST step because the CISO must understand the full scope and severity of the situation before taking action. This scenario involves complex intersecting issues: • **Data Sovereignty Concerns** - The acquiring company operates under different legal jurisdiction with potentially conflicting data access laws • **GDPR Compliance Impact** - Must evaluate whether the acquisition creates a violation of GDPR's cross-border data transfer requirements • **Contractual Obligations** - 18 months remain on the contract, creating financial and operational considerations • **Business Continuity** - Customer PII is actively being processed by this vendor The risk assessment will quantify the actual regulatory exposure, determine if this creates a material breach of GDPR, evaluate the likelihood of government access to customer data, and identify all available remediation options. Only after understanding these risks can the CISO make informed decisions about next steps. **Why the Other Options Are Wrong:** **A. Invoke termination clause immediately** - This is reactive and premature. Terminating without understanding the actual risk could be unnecessarily disruptive and expensive. There may be contractual penalties, operational disruptions, and the new jurisdiction may actually have adequate protections. This violates the principle of risk-based decision making. **C. Require vendor to migrate data** - This assumes migration is necessary, possible, and permitted under the contract. The CISO doesn't yet know if this is required or feasible. The vendor may not be obligated to comply with such a demand, and this could breach the existing contract terms. **D. Notify DPA and customers** - While transparency is important, premature notification without understanding the actual risk could cause unnecessary alarm, regulatory scrutiny, and reputational damage. Under GDPR, notification is required when there's a confirmed compliance issue or breach - not for every potential risk that requires investigation.
CISSP Practice Question (Domain 8: Software Development Security)
A development team integrates a generative AI coding assistant that was trained on public repositories. The tool accelerates feature delivery but occasionally references deprecated libraries. Legal warns that AI-generated code may contain license violations or expose proprietary logic if the model was trained on leaked internal code. What should the security manager do FIRST? A. Engage legal counsel to review the AI vendor's training data sources and contractual indemnification clauses B. Implement software composition analysis (SCA) and require all AI-generated code to be digitally signed before commit C. Restrict the AI tool's access to internal repositories and enforce output review through secure-coding peer validation D. Retrain or fine-tune the AI model using only vetted, license-compliant code from approved sources
1 like • 3d
@Shane Symons I don't see a specific "style" format saved from our previous conversations. Could you share the answer style/template you'd like me to use, or would you like me to answer this in a standard CISSP exam prep format? In the meantime, here's my analysis: Correct Answer: A Why A is correct: This is fundamentally a governance and risk management issue before it becomes a technical control issue. The FIRST action must address the legal and contractual exposure — understanding what the organization is liable for, what indemnification exists, and whether the training data creates IP/licensing risk. You can't implement effective controls until you understand the actual risk landscape. Why the others are wrong: - B (SCA + signing): Good technical controls, but implementing them before understanding the legal exposure puts the cart before the horse. What if the vendor agreement already indemnifies you? What if the tool is fundamentally unusable due to licensing? - C (Restrict access + peer review): Operational control that mitigates symptoms but doesn't address root cause. Also, "FIRST" implies sequencing — you'd implement this after understanding your risk posture. - D (Retrain/fine-tune): Assumes you own or control the model. Most organizations use third-party AI assistants — retraining isn't typically an option, and even if it were, it's expensive and time-consuming. CISSP Lens: Domain 8 intersects heavily with governance here. The question tests whether you recognize that risk assessment and legal due diligence precede technical controls in the risk management lifecycle.
CISSP Practice Question (Domain 2: Asset Security)
An organization allows multiple business units to deploy their own AI agents using shared enterprise data lakes. Each unit claims ownership of its AI outputs, while data sources remain centrally managed. A dispute arises after an AI-generated report exposes sensitive correlations between departments. What is the MOST appropriate action to take FIRST? A. Reclassify the AI-generated outputs under the highest data sensitivity level B. Clarify and formally assign data ownership and stewardship for AI-derived assets C. Segregate AI workloads by business unit to prevent cross-correlation D. Implement stronger access controls on the shared data lake Come back for the answer tomorrow, or study more now!
2 likes • 4d
Answer: B The correct answer is B: Clarify and formally assign data ownership and stewardship for AI-derived assets. Explanation: This question emphasizes taking action "FIRST" in response to a data governance conflict. The scenario presents a situation where multiple business units claim ownership of AI outputs generated from centrally managed data, resulting in a data privacy dispute. CISSP Domain 2: Asset Security focuses on protecting organizational assets, including data governance and stewardship. When an AI governance conflict arises, the FIRST priority must be establishing clear ownership and accountability structures. Why B is correct: - Governance comes FIRST: Before implementing technical controls, reclassification, or segregation, you must establish who owns what. This is foundational to all other security measures. - - Establishes accountability: Once ownership is clear, you can determine who is responsible for data classification, access controls, and breach response. - - Prevents future conflicts: Formal assignment prevents competing claims and establishes a single source of truth for data stewardship. Why the other options are incorrect: - A (Reclassify): This is a consequence of establishing ownership, not the first action. You cannot properly classify AI outputs without knowing who owns them. - - C (Segregate): Segregation is a technical control that addresses symptoms, not the root governance problem. - - D (Access controls): Implementing access controls before clarifying ownership is like changing locks on a house where ownership is disputed—it doesn't resolve the fundamental issue. This aligns with the principle that governance precedes controls in the CISSP framework.
CISSP Practice Question (Domain 1: Security and Risk Management)
An organization deploys an AI system that recommends layoffs and budget cuts based on financial and productivity data. Executives approve its use but do not fully understand its decision logic. The recommendations align with profits but raise ethical and reputational concerns internally. What is the MOST appropriate action for the security leader? A. Require human review of all AI-generated workforce decisions B. Document the risk acceptance and ethical considerations in governance records C. Suspend the AI system until explainability requirements are met D. Conduct a privacy impact assessment focused on employee data Come back for the answer tomorrow, or study more now!
1-10 of 701
Vincent Primiani
7
5,343points to level up
Cybersecurity. The Study Group Guy.

Active 1d ago
Joined Apr 29, 2024
New York, NY
Powered by