Academy Login

Weekly CISSP Practice

Exam Questions

Week 1 - Question 1

An independent security researcher discovers a critical zero-day remote code execution (RCE) vulnerability in a widely used enterprise resource planning (ERP) software suite. The researcher intends to adhere to the principles of Responsible Disclosure while also ensuring that the broader security community is eventually protected.

Which of the following actions best aligns with (ISC)² ethical canons and the industry standard for coordinated vulnerability disclosure (CVD)?

A. Disseminating a Proof of Concept (PoC) to a public security mailing list to pressure the vendor into an immediate emergency patch.

B. Notifying the vendor directly or through their established bug bounty platform and providing a reasonable timeframe for remediation before public disclosure.

C. Filing a formal report with the national law enforcement agency’s cybercrime division to ensure the vendor is legally compelled to fix the flaw.

D. Securing the exploit details within an encrypted offline vault and taking no further action to ensure the vulnerability is not weaponized by third parties.

The Winner: B
Why this is the correct "CISSP" Answer
In our world, this is called Coordinated Vulnerability Disclosure (CVD). It’s all about balance. You aren't just a "techie" finding bugs; you’re a professional with an ethical code.

Here is the "why" behind the answer:

The (ISC)² Canon Factor: Our first rule is to "Protect society and the common good." If you pick Option A, you’re giving hackers a roadmap to rob people before the vendor even has a chance to lock the door. That's a huge ethical fail.

The "Fair Window": By picking Option B, you’re being a partner, not an enemy. You give the vendor 30, 60, or 90 days to fix it. Once the patch is out, then you can talk about your discovery. This protects the users while still giving you credit for the find.

The Bug Bounty Ecosystem: Most big companies actually have a "Safe Harbor" policy now. If you go through their official portal (Option B), they won’t sue you, and they might even pay you. It’s the only way to stay "legal" and "honorable" at the same time.

Why the others are trap answers?
A is too aggressive: It’s "Full Disclosure," and while it’s great for your Twitter followers, it’s terrible for the grandmothers and small businesses whose data gets stolen because you didn't give the vendor time to patch.

C is a waste of time: Unless a crime has actually happened, the police don't care about a "potential" bug. They can’t write code, so they can’t fix the problem.

D is "Security by Obscurity": If you found it, a bad guy will find it eventually, too. Sitting on it doesn't help anyone; it just leaves a ticking time bomb in the software.

The CISSP wants you to be the adult in the room. Reporting through the right channels ensures the fix actually happens without the world burning down in the process.

Podcasts

Check out my weekly podcasts that delve deep into the relevant topics related to each of CISSP domains. In addition, I will go over specific questions and they can be interpreted and answered.

Listen Podcasts

CISSP Cyber Training Academy

Tired of not knowing how to study for the CISSP Exam? 

Check out the CISSP Cyber Training Academy to help you on your journey!

Learn about the Academy!

CISSP Cyber Training - YouTube

Check out my video collection on YouTube discussing all the details needed to help you pass the CISSP exam.   

Check out channel