Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

CISSP Study Group

Public • 737 • Free

47 contributions to CISSP Study Group
ISC2 Code of Ethics
Question: You are an information security professional who discovers that your company is planning to implement a new system that you believe could violate customer privacy laws and compromise personal data. However, you are not directly responsible for this system, and your manager insists that the implementation is legal and business-critical. According to the ISC2 Code of Ethics, what is your best course of action in this scenario?
Poll
16 members have voted
4
10
New comment 4h ago
0 likes • 5d
As a side note, while answering such questions kindly keep the ISC2 4 Canons in mind and if you see more than one correct answer, always remember the order of those Canons. (Random example): - with no context around, if you are to choose between 1) protecting the privacy of customers 2) taking a legal consultation before acting and 3) saving your company's name. At least for CISSP exam choose 1) protecting customer. Though all answers are correct, (1) represents Canon 1 and so the 2nd best option is (2) take legal consultation (representing Canon 2) and so on. FYI only, thank you. Happy learning!
1 like • 2d
@Deepu Thomas Thanks for sharing your point of view. I am sure ISC2 is not looking us to have a conflict with our managers either 😁. Your explanation does makes sense and so does the others, I am really getting confused of such question where there is so much ambiguity. I hope there is a better way to tackle these questions on the exam day.
PaaS vs. IaaS vs. SaaS vs. CaaS: How are they different?
I found this article and image that helps clearify the differences between IAAS, CAAS, PAAS, FAAS, and SAAS. https://cloud.google.com/learn/paas-vs-iaas-vs-saas
6
1
New comment 4d ago
PaaS vs. IaaS vs. SaaS vs. CaaS: How are they different?
1 like • 4d
@Christopher Schneider thanks for sharing this, it was really helpfull.
PQ
Integrity is protection of data from all of the following EXCEPT: A.Unauthorized changes B.Accidental changes C.Data analysis D.Intentional manipulation
4
4
New comment 4d ago
1 like • 4d
C
Can't believe it but...
I passed today! It's difficult to summarize the exam experience. I've scheduled it thinking "OK, I'm confident on about 80% of the content, so I should be able to do some damage control on the 20% left". CISSP exam from the 3rd question until the end : "So, let's talk about those 20% 😏" Even with the knowledge, it was sometimes (often) completely impossible for me to rationally select an answer, as if knowledge was necessary but not sufficient. If it happens to you, don't give up and trust your intuition. Study strategies I've found useful : 1. Being part of this community, where I've been feeling supported and valued. Hello @Vincent Primiani 🙂 2. The awesome and comprehensive study sessions @Josh Botz 3. Books I used and loved : Destination CISSP ebook (super useful to understand quickly a lot of content), All-in-One CISSP exam guide (super useful to go into greater detail) 4. Learnzapp for the practice questions and practice tests, really a good training for the exam 5. Taking the CC exam. Thanks to @Clifford Jenkins and @Jon Brown for suggesting that.
21
17
New comment 9h ago
1 like • 5d
@M B wow, what a great news. Congratulation, you totally deserved it. Thanks for sharing your experience. 🎉🥳
Question of The Day for Our Study Group
I got this question from my upcoming practice quiz from my ebook: CISSP Exam Certification Companion. I will hold off on giving all of you the correct answer until later to see what everyone is picking. "In the context of IT management and governance, the Control Objectives for Information and Related Technology (COBIT) framework serves as a valuable tool. Who among the following roles would typically choose and utilize the COBIT framework to balance security controls and business requirements?" Source: CISSP Exam Certification Companion, page 183 practice questions. A. Data owners B. Information stewards C. Enterprise owners D. Data custodians
2
3
New comment 6d ago
2 likes • 6d
My guess is C (Enterprise owner) Reason: - remember reading that one of the principles of COBIT is to have a holistic view of the enterprise, and so i choose "C"
1-10 of 47
Roshan Laloo
4
79points to level up
@roshan-laloo-1385
My name is Roshan and I am from Bangalore, India.

Active 6h ago
Joined Aug 15, 2024
Bangalore, India
powered by