User
Write something
Study Group (930AM EST Thurs) is happening in 9 hours
CISSP Practice Question (Domain 4: Communication and Network Security - AI Exam Guidance)
Your data science team trains ML models using distributed GPU clusters across three cloud regions. The security team discovers that training data and model parameters traverse the corporate WAN unencrypted alongside general business traffic. What should the network security architect recommend FIRST? A. Encrypt all WAN traffic using a site-to-site VPN between the three cloud regions B. Implement micro-segmentation to isolate AI training environments from enterprise traffic C. Deploy a CASB to monitor and control data movement between cloud regions D. Migrate all training workloads to a single region to eliminate cross-region data transit Come back for the answer tomorrow, or study more now!
CISSP question
After containing a ransomware attack, an organization begins restoring critical systems from clean backups. Forensic analysis confirms that the malware has been removed and backups were not compromised. However, the incident response team warns that some security weaknesses that allowed the initial compromise may still exist. What should the organization do as part of the recovery phase of incident management? A. Restore all affected systems immediately to resume operations and investigate the root cause after services stabilize. B. Keep affected systems offline until the incident report is completed and approved by executive management. O c. Reconnect restored systems to the production network while monitoring them for abnormal activity. D. Validate system integrity and strengthen controls before returning restored systems to normal production operations.
CCSP Study Group
CCSP study group on Thursdays at 7 PM Eastern time. Check the calendar and be sure to join next week.
Poll
67 members have voted
CCSP Study Group
CISSP Practice Question (Domain 8: Software Development Security - AI Exam Guidance)
Developers at your company use an LLM-powered coding assistant that auto-generates functions pulled into production via CI/CD. A recent audit reveals several generated functions contain hardcoded credentials and insecure deserialization patterns. What should the security manager prioritize FIRST? A. Ban the AI coding assistant until the vendor eliminates hallucinated vulnerabilities B. Require developers to manually review all AI-generated code before committing C. Integrate automated AI security testing into the CI/CD pipeline to catch flaws pre-production D. Report the insecure patterns to the LLM vendor for model fine-tuning Come back for the answer tomorrow, or study more now!
CISSP Practice Question (Domain 6: Security Assessment and Testing - AI Exam Guidance)
Your organization's fraud detection ML model passes all traditional software vulnerability scans. However, a red team discovers they can subtly alter transaction inputs to cause the model to misclassify fraudulent activity as legitimate. What testing gap does this BEST illustrate? A. The vulnerability scans lacked authenticated scanning credentials B. Static application security testing was not integrated into the CI/CD pipeline C. The assessment program did not include adversarial robustness testing of the model D. The red team should have coordinated findings with the vulnerability management team first Come back for the answer tomorrow, or study more now!
1-30 of 1,021
CISSP Study Group
skool.com/cybersecurity-study-group
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
Powered by