Notice of Wentz QOTD

The Assistant General Counsel, Alex H. Rosenfeld, Esq., replied to me on May 7, 2021, which states, “I have confirmed with our team that your questions are original, and you may disregard the notice that was sent.” I’m grateful for the efficient response and confirmation from (ISC)² and will continue to develop Wentz QOTD.

Please refer to Wentz QOTD Notice of Originality for more.

Continue reading

CISSP PRACTICE QUESTIONS – 20210428

Effective CISSP Questions

You are a developer of the Agile team that develops the customer relationship management system for your company. Which of the following is least likely for you to do? (Wentz QOTD)
A. Configure the database connection setting
B. Write unit tests before the production code are done
C. Interact with customers directly for software requirements
D. Respond to customer’s bug report directly to restore service level in time

Continue reading

CISSP PRACTICE QUESTIONS – 20210427

Effective CISSP Questions

As an ID provider, Taiwan Airline federated with a chain of a car rental company and a five-star chain hotel. Customers can log into the airline website supported by single sign-on (SSO) and reserve hotels or rent a car. Which of the following is least likely to happen? (Wentz QOTD)
A. Assertions or claims about a customer may be described in the JSON format.
B. A customer typically has a user account on each airline, car rental, and hotel domain.
C. If the airline system goes down, customers cannot log into other federated systems.
D. Car rental and hotel systems may send a query to the airline for customer data.

Continue reading

Internet Key Exchange (IKE) and Security Association (SA)

I came across this post about IKE and ISAKMP on Luke’s group and found it deserves further study. My suggested answers would be A (IKE) for the first question and D (ISAKMP) for the second because IKE is the implementation of ISAKMP. RFC 7296 “describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining Security Associations
(SAs).”

Continue reading

CISSP PRACTICE QUESTIONS – 20210426

Effective CISSP Questions

Your company is publicly traded. A ransomware attack has materialized and is threatening to publish confidential customer data unless a ransom is paid. The board of directors is concerned that the ransomware attack will compromise shareholders’ confidence and stock price. Which of the following is the best plan that addresses the concern? (Wentz QOTD)
A. Disaster recovery plan
B. Business continuity plan
C. Crisis communication plan
D. Information system contingency plan

Continue reading

CISSP PRACTICE QUESTIONS – 20210425

Effective CISSP Questions

Your organization suffers from a ransomware attack, threatening to publish confidential customer data unless a ransom is paid. The incident has been escalated to a problem. Which of the following is least likely to happen next? (Wentz QOTD)
A. Restore files
B. Perform forensics investigation
C. Validate if the incident is genuine
D. Conduct security awareness training

Continue reading