Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CISSP Study Group

1.8k members • Free

8 contributions to CISSP Study Group
CISSP Practice Question (Domain 5: Identity & Access Management / Privileged Access Controls)
During a quarterly access review, an organization discovers that several DevOps engineers have accumulated multiple privileged roles across different cloud environments due to automated provisioning workflows that never revoked old permissions. No misuse has been detected, but the roles collectively exceed least-privilege requirements and present a potential lateral-movement risk. What should the security manager do FIRST? A. Immediately disable all excessive roles and force users to request access again B. Conduct a risk analysis to understand business impact before removing permissions C. Implement just-in-time privileged access to eliminate standing permissions D. Escalate the issue to HR for potential policy violations
1 like • 16h
@Allison Regan Right as always.
CISSP Practice Question (Domain 7: Security Operations / Supply Chain Risk)
An enterprise discovers that a widely used third-party monitoring agent embedded in multiple production servers has begun making undocumented outbound connections to an IP range controlled by a subcontractor the enterprise has never engaged. The agent is critical for operational visibility, and disabling it would blind several detection controls. No malicious activity has been confirmed, but threat intelligence reports suggest recent supply chain compromises involving similar agents. What should the security manager do FIRST? A. Immediately isolate all hosts running the agent from the network B. Conduct a rapid supplier risk reassessment and verify the legitimacy of the subcontractor relationship C. Disable the agent across production to eliminate potential exfiltration D. Escalate directly to regulators due to potential third-party data exposure
0 likes • 2d
@Martin Joplin šŸ˜‚
1 like • 2d
"critical for operational visibility"and "disabling would blind" effectively eliminates A and C. No reference to GDPR, Eurozone, or a tightly regulated industry eliminates D. I guess B is the best answer from process of elimination.
CISSP Practice Question (Domain 7: Security Operations / Incident Response + AI Context)
Rymar Tech’s SOC deploys a new AI-based anomaly detection system that suddenly begins generating an unusually high volume of high-risk alerts after being retrained with third-party data the previous night. No malicious activity has been confirmed, but the alert surge is overwhelming SOC analysts and impacting monitoring effectiveness. What should the incident response manager do FIRST? A. Disable the AI platform and revert to manual triage B. Escalate to the CISO and declare a security incident C. Initiate the incident response process beginning with detection and verification D. Conduct a model validation review with the third-party integrator
4 likes • 3d
C - Think like a manager - process (think like a manager) - Rest are direct actions which you would take in this order - B > A > D (cause its a BAD product, lol) Incident response: detecting > analyzing > containing > eradicating > recovering Per NIST: Preparation > Detection and Analysis > Containment, Eradication, and Recovery > Post-incident Activity
1 like • 3d
@Allison Regan Thanks Allison. Looks like you beat me to it. Your answer seems much more thoughtful.
Question on GDPR - can someone explain me this.
A breach exposes encrypted personal data. The encryption keys are stored securely and were not compromised. Under GDPR, what is the most accurate interpretation regarding breach notification to the supervisory authority? A. Notification is always required, regardless of encryption B. Notification is not required because the data is encrypted C. Notification is required only if there is a high risk to rights and freedoms D. Notification is required only if the data subjects complain
1 like • 6d
A Always notify.
1 like • 4d
@Shradhanjali Barik Hassan has it correct. Risk-Based Approach: GDPR notification hinges on whether the breach is "likely to result in a risk to the rights and freedoms of natural persons. The core principle is assessing risk to rights and freedoms; if encryption effectively nullifies that risk, the stringent 72-hour notification rule (Article 33) doesn't typically kick in, though documenting this assessment is crucial.
CISSP Practice Question – Domain 4 (Communication & Network Security)
A global enterprise adopts a strict zero-trust network architecture. All workloads—on-prem, cloud, and containerized—must mutually authenticate before communicating. To comply with regulatory requirements, the company must also maintain full packet-level visibility for threat analysis and incident response. Which solution BEST satisfies all of these requirements simultaneously? A. Deploy full end-to-end TLS between all workloads and rely on IDS/IPS to inspect only metadata and flow logs. B. Use a TLS termination proxy at network choke points and decrypt all internal traffic for inspection before re-encrypting. C. Implement mutual TLS within a service mesh that supports encrypted telemetry export and out-of-band traffic mirroring for deep packet inspection. D. Use host-based agents to perform inline decryption on each workload and send decrypted payload streams to the central IDS via secure channels.
1 like • 8d
C Not A: "only metadata and flow logs" - only is almost always never the right answer Not B: No mention of authentication, no reference to Zero Trust Not D: Ignores the "network" part of a Zero Trust Network C: TLS - satisfies ZTN, Encrypted Telemetry export (satisfies regulatory requirements), deep packet inspection = full packet-level visibility - all encompassing solution
1-8 of 8
Vivek Sridhar
2
8points to level up
@vivek-sridhar-5050
Starting out in Cybersecurity

Active 15h ago
Joined Dec 3, 2025
Powered by