Your company is developing a web site for E-Commerce. As an architect, you have just finished the architectural design. Which of the following best supports the identification of security issues? (Wentz QOTD)
A. Penetration testing
B. Vulnerability scanning
C. Common Weakness Enumeration (CWE)
D. Common Vulnerabilities and Exposures (CVE)
Monthly Archives: May 2021
CISSP PRACTICE QUESTIONS – 20210515
Your company is a well-known global cloud service provider serving millions of customers. Which of the following best supports the multi-tenancy feature mentioned in ISO/IEC 17888? (Wentz QOTD)
A. EAP over LAN (EAPoL) based on 802.1X
B. Virtual LAN (VLAN) based on IEEE 802.1Q
C. Virtual eXtensible Local Area Network (VXLAN) based on RFC 7348
D. Spanning Tree Protocol based on 802.1D
CISSP PRACTICE QUESTIONS – 20210514
Your company started an engineering project to develop an E-Commerce website following ISO 15288. Which of the following is least likely to be treated as an organizational project enabler? (Wentz QOTD)
A. Life cycle model management
B. Risk management
C. Knowledge management
D. Infrastructure management
CISSP PRACTICE QUESTIONS – 20210513
Your company is a cloud service provider. Which of the following provides the highest security assurance to customers? (Wentz QOTD)
A. SOC 2 attestation
B. ISO 27001 certification
C. Security Self-Assessment
D. STAR attestation or certification
CISSP PRACTICE QUESTIONS – 20210512
Fuzz testing is an automated software testing technique that employs a fuzzer to generate test data as inputs to software under test randomly. Which of the following is correct? (Wentz QOTD)
A. Fuzzing test using a smart fuzzer is white-box testing.
B. A smart fuzzer aware of input structure primarily mutates meaningful test data.
C. A generation-based fuzzer relies on modifying existing test data randomly.
D. A dumb fuzzer doesn’t rely on detecting input structure to generate test data.
Manifesto for Agile CISSP Preparation
Security Assessment and Audit
CISSP PRACTICE QUESTIONS – 20210511
There exist many perspectives of Zero Trust. Which of the following is correct? (Wentz QOTD)
A. Zero Trust adoption uses the big bang strategy.
B. Zero Trust networks may coexist with legacy networks isolated by firewalls.
C. Zero Trust prevents lateral movement through the castle-and-moat architecture.
D. Zero Trust, aka perimeterless security, doesn’t define any forms of the perimeter.
CISSP PRACTICE QUESTIONS – 20210510
Which of the following is not one of the common assessment methods used in a risk-based audit? (Wentz QOTD)
A. Examining
B. Interviewing
C. Testing
D. Delphi method
CISSP PRACTICE QUESTIONS – 20210509
After suffering from an attack of ransomware, the board of directors is concerned with the effectiveness of security function. If the CEO’s time is tied up, which of the following is the best reporting line of the information security head to enforce security? (Wentz QOTD)
A. Report to the CEO to get full commitment and support
B. Report to the CIO to take advantages of cutting edge technologies
C. Report to the COO to fully integrate security into business processes
D. Report to the CAE (chief audit executive) to eradicate uncompliant findings