After activating the login window and logging in your PC, you are visiting your bank’s website, https://BankOfEffectiveCISSP.com, and transferring funds from one bank account to the other. The transaction shall be authenticated and authorized by typing in the authentication code and swiping the ATM card. Which of the following does not happen in this scenario? A. Side channel B. Covert channel C. Trusted path D. Trusted channel
In a VoIP network, which of the following is the best protocol to protect the signaling traffic for initiating, maintaining, and terminating real-time sessions that include voice, video, and messaging applications? A. Session Initiation Protocol (SIP) B. SRTP C. TLS/SSL D. MGCP
Which of the following cryptographic operations is least applicable in quantum cryptography? A. Generate a one-time pad B. Distribute the encryption key C. Encrypt the plain text D. Ensure sufficient entropy for encryption
Quantum computing is the use of quantum phenomena such as superposition and entanglement to perform computation. Which of the following is most vulnerable to quantum computing? A. Stream cipher B. Symmetric encryption C. Public key infrastructure D. Lattice-based cryptosystem
If you’ve bought The Effective CISSP: Practice Questions, please do read my justification on my blog and research to learn from the question. This book and Wentz QOTD are a learning tool instead of an evaluation one.
It helps you clarify concepts and learn by topics. If you intend to use it to “evaluate” your performance, please finish the study guide at least once. It’s expected that you will score between 40% to 80%. If you score above 70%, your performance is pretty good. I believe you will feel comfortable with the real exam.
Please don’t feel frustrated, use my book correctly will help you clarify concepts and learn more!
Please don’t hesitate to comment to let me know how my book is helping or discouraging you. Thank you very much for your kind support! I hope you kill the beast as your planned schedule! All the best!!
Which of the following statements about user and entity behavior analytics (UEBA) is not true? A. UEBA collects live data from various sources, as SIEM does. B. UEBA analyzes user behavior only, while SIEM monitors network device activities. C. UEBA detects potential insider threats and compromised accounts. D. UEBA sends alerts and reduces false positives.
Threat feeds convey a large quantity of data, including Indicators of Compromise (IoCs), pieces of forensic data that identify potentially malicious activities. Security analysts analyze, enrich, and turn them into threat intelligence, and security teams use them to look for persistent threats and recently discovered or zero-day exploits. Which of the following indicators provided by threat feeds provides the most value? A. Host Artifacts B. Domain Names C. Hash Values D. Tools