CISSP 2023 Practice Questions (Scenario-Based) - Domain 1: Security & Risk Management

  Рет қаралды 5,387

InfoSec Guardians

InfoSec Guardians

Күн бұрын

Пікірлер: 19
@Tradmos
@Tradmos 10 ай бұрын
This is a surprising answer... Accepting the risk is a big gamble when a critical vulnerability is already identified.
@InfoSecGuardians
@InfoSecGuardians 10 ай бұрын
Considering the criticality of application for daily operation, Business may accept the Risk. While accepting the risk is not always the best long-term solution, in some cases, it may be a pragmatic approach to managing the immediate impact of a critical vulnerability until a permanent fix can be implemented. This approach may be accompanied by temporary measures to mitigate the risk and a plan to implement a permanent fix as soon as feasible.
@MrNight12pm
@MrNight12pm 22 күн бұрын
Q3: Right answer : B) Conduct an internal investigation and notify affected customers
@Tradmos
@Tradmos 10 ай бұрын
Question 4. You cannot provide a secure approved device for the executive, and enforce BYOD at the same time.
@InfoSecGuardians
@InfoSecGuardians 10 ай бұрын
Organizations today operate in a hybrid environment where Organizational Devices and BYOD go hand in hand. Enforcing the BYOD policy and providing a secure, approved device for the executive is the most appropriate action because it ensures security compliance, mitigates risks, maintains consistency in policy enforcement, and helps the executive understand the importance of security practices. In practice, Senior Executives are provided with secure devices (eg. Mobile, iPad etc) while they also use BYOD for ease of business.
@ArunKumar-jy7cg
@ArunKumar-jy7cg Жыл бұрын
Very useful content 😊
@anupanu-yc5kq
@anupanu-yc5kq 3 ай бұрын
Can not agree with Q3 answer, you can not kick someone out & that is not your responsibility. it should be option C, When dealing with a data breach involving sensitive customer information, the first priority should be to understand the full scope of the breach by conducting an internal investigation. This helps determine the extent of the leak, the specific data involved, and the employee's actions. Based on the investigation findings, the organization can take appropriate steps to mitigate damage and ensure future breaches don’t occur. Notifying affected customers is critical in maintaining transparency and complying with regulatory requirements (e.g., GDPR, CCPA) to ensure the organization’s legal obligations are met.
@JaredEvans
@JaredEvans 9 ай бұрын
For Question #5, CISSP preaches that the safety of humans is the #1 priority, no matter what. Why isn't B) Relocating the data center to fire-resistant building, not the best answer? This would warrant immediate action. Developing and testing a DRP would take a while, and humans would still be at risk due to the high possibility of a fire event.
@faboge
@faboge 10 ай бұрын
Why is question 1 not a compliance risk? I keep seeing PCI DSS
@InfoSecGuardians
@InfoSecGuardians 10 ай бұрын
In this scenario the organization may be in compliance with PCI DSS but that doesn't guarantee a protection against a breach. Whenever a business is performed, there are always certain risk involved which in this case was vulnerability in payment system. There is always a time lag between vulnerability identification to its remediation and during this time, the system will be at a risk.
@pgunwant
@pgunwant 9 ай бұрын
I find explanations not very correct here. Accepting the risk despite knowing critical vulnerability ? Forcing BYOD policy first and then providing separate devices to the executive. I really couldn’t understand it.
@InfoSecGuardians
@InfoSecGuardians 9 ай бұрын
Thanks for your review. Let us understand the rationale. For the First comment:- Risk Acceptance is always decided by Business. While may rate the Issue / Vulnerability as Critical, Business nay still continue with the Risk to cease opportunity. Classic example is WFH during Pandemic. Security is a support function to Business and not a Business in itself. Second Comment:- Organizations today operate in a hybrid environment where Organizational Devices and BYOD go hand in hand. Enforcing the BYOD policy and providing a secure, approved device for the executive is the most appropriate action because it ensures security compliance, mitigates risks, maintains consistency in policy enforcement, and helps the executive understand the importance of security practices. In practice, Senior Executives are provided with secure devices (eg. Mobile, iPad etc) while they also use BYOD for ease of business.
@danielumeh3610
@danielumeh3610 Жыл бұрын
Qts 2 .. I disagree with the answer. Let me support my case with this example. Imagine having a car that was recalled due to braking system. Would you accept the risk and keep driving the car? Please I'm here to learn, teach me more. Thank you!
@InfoSecGuardians
@InfoSecGuardians Жыл бұрын
Thanks @danielumeh3610 for your review. Could you please imagine the same car carrying a critical patient to hospital ? Risk is always proportionate to the Reward. The question mentions "application is critical for daily operations". Always remember, as a CISSP you are only consulted (RACI matrix) but the actual decision will be with the Business. t.me/CisspInfosecGuardians
@tareknageeb5650
@tareknageeb5650 9 ай бұрын
I disagree too. I think the question lacks details to be sure about an accurate answer. Even in your answer you say the organisation "may" choose ... The answer depends on how "critical" the vulnerability is (software is internet reachable, easy to find/exploit vulnerability, ...etc), and what risks it presents (e.g. attacker might overtaken the whole internal network or just one server, reputation can be ruined, all customer data can be compromised, ..etc). For example, if the risk cost is higher than the "daily operations" disruption costs on the company, avoiding the risk (until the issue is mitigated) could be a better decision. Also "mitigating the risk" could be good, for example, if a FW or a WAF can help controlling some of the risk.
@tundeayeni4477
@tundeayeni4477 5 ай бұрын
you can also imagine arround a danger zone whereby you need to drive temporarily to save avoid the danger zone... this is what is meant by accepting the risk in the short term while working arround mitigation on the long term.
@bidztime
@bidztime 21 күн бұрын
@@InfoSecGuardians I will still mitigate the risk in several ways. I would drive slower and more carefully. I will make sure that if we have an accident the passengers are better secured secured. I will have my flashers on. I will try to take a route with less traffic etc. etc. and definitely once I drop the patient off I will use a different vehicle to ride patients as risk mitigation strategy, until the recall is taken care of. Accepting a risk in this situation is absolutely a big negative.
@khanget
@khanget 5 ай бұрын
Some of the answers are not correct in this video can't agree to the given explanation to the answer.
@AhsanKhawaja-l4e
@AhsanKhawaja-l4e 5 ай бұрын
Not accurate
CISSP Practice Question #1 - Vulnerability Assessment Process
5:33
Destination Certification
Рет қаралды 29 М.
Jaidarman TOP / Жоғары лига-2023 / Жекпе-жек 1-ТУР / 1-топ
1:30:54
Every team from the Bracket Buster! Who ya got? 😏
0:53
FailArmy Shorts
Рет қаралды 13 МЛН
Wednesday VS Enid: Who is The Best Mommy? #shorts
0:14
Troom Oki Toki
Рет қаралды 50 МЛН
Avoid These Common CISSP Domain 1 Mistakes in 2024
16:39
Prabh Nair
Рет қаралды 3,7 М.
CISSP 2023 Practice Questions (Scenario-Based) - Domain 2: Asset Security
19:06
CISSP-Domain 1-Review Questions 1 to 20
28:43
Seo Rod
Рет қаралды 4,9 М.
50 CISSP Practice Questions. Master the CISSP Mindset
1:34:48
Technical Institute of America
Рет қаралды 187 М.
Tea Time - My CISSP Journey
14:59
Kim Tech
Рет қаралды 9 М.
CISSP Memorization Tips and Techniques (ultimate guide)
21:07
Inside Cloud and Security
Рет қаралды 37 М.
CISSP Domain 1 Practice Questions 2022
11:33
Prabh Nair
Рет қаралды 18 М.