Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Owned by Vincent

CISSP Study Group

1.5k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

Wild Mushroom Hunting Group - New Paltz | Local foraging community for mushroom hunters in the Hudson Valley. Join hunts & learn mycology together.

Memberships

CyberMAYnia Club

41 members • Free

567 contributions to CISSP Study Group
CISSP Practice Question – BC/DR
A financial institution is designing its disaster recovery strategy. Management states that after a disruption, customer-facing services must be restored within four hours, and no more than 30 minutes of customer transaction data can be lost. Which of the following BEST describes these requirements? A. RTO = 30 minutes, RPO = 4 hours B. RTO = 4 hours, RPO = 30 minutes C. RTO = 4 hours, RPO = 4 hours D. RTO = 30 minutes, RPO = 30 minutes
CISSP Practice Question – Security Architecture & Engineering
An organization is selecting a system that must provide strong assurance that all access control decisions are enforced correctly and cannot be bypassed. The evaluation team is considering systems certified under the Common Criteria (ISO/IEC 15408) framework. Which of the following Common Criteria assurance levels BEST meets this requirement? A. EAL2 – Structurally Tested B. EAL4 – Methodically Designed, Tested, and Reviewed C. EAL5 – Semiformally Designed and Tested D. EAL7 – Formally Verified, Designed, and Tested
0 likes • 23h
@Nuno Simões D. EAL7 – Formally Verified, Designed, and Tested Explanation:The Common Criteria (ISO/IEC 15408) uses Evaluation Assurance Levels (EALs) from 1–7 to describe the depth and rigor of a system’s evaluation. - A. EAL2 – Structurally Tested – Low assurance, minimal rigor. Suitable for environments where threats are not significant. - B. EAL4 – Methodically Designed, Tested, and Reviewed – The highest level commonly achievable in commercial products, balancing assurance with practicality. Good for many enterprises, but not the strongest possible. - C. EAL5 – Semiformally Designed and Tested – Higher rigor than EAL4, suitable for specialized environments requiring strong security. - D. EAL7 – Formally Verified, Designed, and Tested – ✅ Correct. Provides the strongest assurance, with formal mathematical proof and rigorous design/testing to ensure enforcement mechanisms cannot be bypassed. Typically reserved for highly sensitive systems (e.g., military, government). Think like a manager: The question asks for the BEST assurance that access controls cannot be bypassed. That maps to EAL7, even though in real life EAL4 is usually the sweet spot for commercial use.
CISSP Practice Question – Identity & Access Management
An enterprise is moving to a hybrid cloud model and wants to centralize user authentication across on-premises systems and multiple SaaS providers. The solution must support single sign-on (SSO), enforce multi-factor authentication (MFA), and minimize administrative overhead for provisioning and deprovisioning accounts. Which of the following approaches BEST meets these requirements? A. Deploying Kerberos across all environments, including the SaaS providers B. Implementing a Security Assertion Markup Language (SAML)–based federation with an identity provider C. Using RADIUS servers for all authentication requests to centralize credential management D. Requiring each SaaS provider to integrate directly with the corporate LDAP directory
0 likes • 3d
@Justin Craigon
1 like • 2d
@Jesús Zayas Correct Answer: B. Implementing a Security Assertion Markup Language (SAML)–based federation with an identity provider Explanation: The requirements are: SSO, MFA support, and low admin overhead across on-prem + SaaS. - A. Kerberos across all environments – Kerberos works well on-prem but is not practical across cloud/SaaS providers that don’t natively support it. Too limited. - B. SAML federation with an IdP – ✅ Correct. SAML is the industry standard for SSO across cloud services. With an identity provider (IdP), you can enforce MFA and centralize provisioning/deprovisioning through federation. - C. RADIUS servers – Centralizes authentication, but it’s mainly for network access (VPN, Wi-Fi). It doesn’t provide web-based SSO to SaaS platforms. - D. Direct LDAP integration with each SaaS – Creates high administrative overhead and scaling issues. Each SaaS would need a custom connection to the directory. Think like a manager: SAML-based federation is the most scalable, standards-based solution for hybrid + SaaS environments. It enables SSO, MFA enforcement, and streamlined account management.
Practice Question – Security Models
You are designing a system for a law firm that represents multiple competing corporations. The system must: - Prevent lawyers from accessing case files of competing clients - Ensure paralegals can enter data but only senior attorneys can approve filings - Maintain confidentiality of client records Which combination of models is most relevant here? A. Bell–LaPadula and Biba B. Clark–Wilson and Brewer–Nash C. Bell–LaPadula and Clark–Wilson D. Brewer–Nash and Biba
1 like • 3d
@Justin Craigon Brewer–Nash handles the conflict of interest part (lawyers can’t cross into competitor data). - Clark–Wilson handles the separation of duties (paralegal enters, attorney approves).
CISSP Practice Question – Security Assessment & Testing
A company’s security team is planning regular vulnerability assessments of its production systems. Management insists that business operations must not be disrupted during these tests. Which of the following approaches BEST meets this requirement? A. Run authenticated vulnerability scans against production systems during business hours. B. Conduct penetration tests against production systems once per quarter. C. Perform vulnerability scans in a staging environment that mirrors production. D. Schedule uncredentialed vulnerability scans of production systems during off-peak hours.
2 likes • 4d
@Eduardo Polanco Correct Answer: C. Perform vulnerability scans in a staging environment that mirrors production. Explanation:The key phrase is that business operations must not be disrupted. - A. Authenticated scans during business hours – Too risky. Authenticated scans probe deeply and could impact live systems, especially during peak hours. - B. Penetration tests on production – Even more disruptive. Pen tests simulate real attacks and can cause outages. Not suitable when availability is the priority. - C. Vulnerability scans in staging – ✅ Correct. Scanning a mirrored staging environment avoids disruption to production while still identifying vulnerabilities. This balances security testing with business continuity. - D. Uncredentialed scans off-hours – Less impact, but still performed on production. Even uncredentialed scans can cause instability or trigger alarms. Doesn’t fully remove the risk to operations. Think like a manager: The exam wants you to minimize risk to business operations. Testing in a mirrored staging environment is the safest and most aligned with the requirement.
1-10 of 567
Vincent Primiani
7
5,981points to level up
Cybersecurity. The Study Group Guy.

Active 1h ago
Joined Apr 29, 2024
Tampa, FL
Powered by