Activity
Mon
Wed
Fri
Sun
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

CISSP Study Group

Public • 1k • Free

26 contributions to CISSP Study Group
Practice Question
Which of these would be a Key Performance Indicator (KPI) that requires paying attention at the change request procedures?
Poll
6 members have voted
1
4
New comment 3d ago
1 like • 3d
Answer C because it shows a deficit in planning and resource constraints, which causes things like overwhelming teams and moves resources from other areas that would normally not be the case.
Practice Question
An organization is planning a penetration test that simulates the malicious actions of a former network administrator. What kind of penetration test is needed?
Poll
9 members have voted
2
4
New comment 5d ago
1 like • 5d
White box. It provides the tested with detailed knowledge of the network architecture, configurations, and admin access.
Practice Question
The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated? - A. Data loss protection (DLP) - B. Intrusion detection - C. Vulnerability scanner - D. Information Technology Asset Management (ITAM)
1
6
New comment 5d ago
3 likes • 5d
D. Information Technology Asset Management (ITAM) because it makes for quickly locating a device infected with malware and enabling remediation detections.
Practice Question
What would be the BEST way to treat a natural disaster risk with a low probability and high impact?
Poll
7 members have voted
1
4
New comment 5d ago
3 likes • 5d
My answer is A - Transfer the risk, because of low probability- this is where insurance would come into play. The ideal thing would be to have a combination of A & B to reduce damage and ensure business continuity.
Practice Question
Mike is the Information Security manager of the organization. With having offices across the globe, Mike has to ensure that the local security program is in compliance with what? a. Corporate data privacy policy. b. The data privacy policies where they collect and store specific data. c. The data privacy policies where headquarters are located. d. The data privacy directives that are applicable across the world.
2
4
New comment 5d ago
2 likes • 5d
Answer B is my guess because of local data privacy laws and regulations. Corporate policies have to align with local regulations, but local laws take precedence when they impose stricter requirements.
1-10 of 26
@raj-marathe-5176
Rochester, NY USA.

Active 2d ago
Joined Dec 8, 2024
Rochester, NY
powered by