User
Write something
Community Study Group is happening in 3 hours
Pinned
Don't forget your CPEs for Study Group attendance!
Make sure to self-submit your Study Group attendance for ISC2 CPEs!
Don't forget your CPEs for Study Group attendance!
Pinned
CISSP passed
Hi Everyone, I’m proud to share that I have provisionally passed the CISSP CAT exam today! It will definitely test your fitness, but it is all worth it. Huge respect to everyone here. For those who are still traveling, keep going; it will be worthwhile, and you will reach the end. Here's my personal strategy for exam prep. Note: This is still required reading: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Sybex Study Guide). Wave 1—Setup 1. Join https://www.skool.com/cybersecurity-study-group (obviously, you're here already 🙂). 2. Subscribe to https://cissp.app/ 3. Buy the book: https://leanpub.com/cissplastmile#about 4. Download and print out: https://destcert.com/cissp-mindmaps/ Wave 2—Study 1. Watch: https://www.youtube.com/watch?v=5BnhDVOnzmg 2. Watch: https://www.youtube.com/watch?v=gKe88tIeVYo 3. Watch in full: https://www.youtube.com/watch?v=aLIFzIBNM_8&list=PL7XJSuT7Dq_XPK_qmYMqfiBjbtHJRWigD 4. Watch in full: https://www.youtube.com/watch?v=hf5NwUSEkwA&list=PLZKdGEfEyJhLd-pJhAD7dNbJyUgpqI4pu 5. Go through the mind maps daily. 6. Read the book. 7. Use cissp.app and practice a minimum of 25 questions each day (three-month prep period). a. Check the gap analysis summary every 100 questions at the latest and go read up on your weak areas. Wave 3—Last month 1. Watch https://www.youtube.com/watch?v=5BnhDVOnzmg 2. Watch https://www.youtube.com/watch?v=gKe88tIeVYo
CISSP Practice Question (Domain 5: Identity and Access Management)
A long-tenured engineer has accumulated access across six business units through internal transfers. A recent audit flagged the account as having excessive privileges, but managers insist the access is "needed for cross-functional projects." What should you do FIRST? A. Disable unused entitlements based on the last 90 days of activity logs B. Initiate a formal access recertification with each respective data owner C. Implement a role-based access control model to replace direct grants D. Escalate to HR to enforce a job description review Come back for the answer tomorrow, or study more now!
CISSP Question - Domian 8
A software project team is strictly adhering to the Cleanroom Software Engineering methodology, emphasizing statistically certified reliability. They are in the final acceptance testing phase of the third product increment. The independent Certification Team has just revealed that, based on statistical usage testing, the calculated Mean Time To Failure (MTTF) for the current increment falls significantly below the minimum certified reliability target established in the contract specification. The implementation team is arguing they should be allowed to run full-coverage unit tests on suspect modules to quickly pinpoint the likely errors before the next build. The Verification Team leader insists on simply increasing the size and diversity of the random-usage test suite to gather more data. What is the most consistent and methodologically sound action you should take next? A. Postpone the increment release, formally document the current achieved MTTF, and defer the required corrective action and refactoring to the next planned incremental build cycle to stabilize the current process. B. Permit the implementation team to perform targeted unit testing on the suspect modules to quickly diagnose the root cause, provided all fixes and tests are fully documented and reviewed by the Verification Team before inclusion in the final build. C. Immediately halt the implementation team's work, conduct a formal design and code walk-through by the independent Inspection Team, and utilize the formal specification to mathematically prove the correction before any code modification is committed. D. Reject the unit testing proposal, require the Certification Team to focus their next testing cycle exclusively on high-risk, unverified use-case profiles to isolate the faults, and then apply minimal, verified changes.
CISSP Practice Question (Domain 2: Asset Security)
A business unit requests permanent retention of all customer transaction records "in case we ever need them." Legal has not issued a hold, and the current retention schedule requires deletion after seven years. As the data owner's advisor, what is the BEST response? A. Honor the request since longer retention reduces legal discovery risk B. Enforce the existing retention schedule and require a formal exception with risk acceptance C. Migrate the records to cold storage to balance cost and accessibility D. Defer to Legal before taking any action on the records Come back for the answer tomorrow, or study more now!
1-30 of 1,996
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by