CISSP PRACTICE QUESTIONS – 20211027

Effective CISSP Questions

It’s commonly agreed that 2015 is the year of threat intelligence sharing. The ecosystem of specifications and standards for threat intelligence sharing is getting mature. Which of the following classifies threat intelligence that might be shared and controls the scope of sharing? (Wentz QOTD)
A. Traffic Light Protocol (TLP)
B. Trusted Automated eXchange of Indicator Information (TAXII)
C. Structured Threat Information eXpression (STIX)
D. Security Content Automation Protocol (SCAP)

Continue reading

CISSP PRACTICE QUESTIONS – 20211026

Effective CISSP Questions

You are implementing an authorization mechanism based on the state machine model to prevent privilege propagation and control information flow for confidentiality. Which of the following is the best mechanism to meet the security requirements? (Wentz QOTD)
A. Identity-based access control
B. Attribute-based access control
C. Role-based access control
D. Lattice-based access control

Continue reading

CISSP PRACTICE QUESTIONS – 20211022

Effective CISSP Questions

Your organization is a well-known software development organization aiming to improve development processes and deliver quality software. Which of the following is the best instrument to benchmark how well your organization performs against other organizations in terms of security? (Wentz QOTD)
A. Capability Maturity Model Integration (CMMI)
B. Cybersecurity Maturity Model Certification (CMMC)
C. Building Security In Maturity Model (BSIMM)
D. Software Assurance Maturity Model (SAMM)

Continue reading