Effective CISSP Questions

You are evaluating security controls to enforce wireless security. Which of the following is least effective? (Wentz QOTD)
A. Add white noise
B. Diminish near-end crosstalk (NEXT)
C. Enable 802.1X to authenticate connection requests
D. Implement a fine metallic mesh that covers the workspace

Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

My suggested answer is B. Diminish near-end crosstalk (NEXT).

Wentz’s book, The Effective CISSP: Security and Risk Management, helps CISSP and CISM aspirants build a solid conceptual security model. It is a tutorial for information security and a supplement to the official study guides for the CISSP and CISM exams and an informative reference for security professionals.

Next End Crosstalk (NEXT)
Next End Crosstalk (NEXT) [Source: Network Encyclopedia]


In electronics, crosstalk is any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. Crosstalk is usually caused by undesired capacitive, inductive, or conductive coupling from one circuit or channel to another.

Crosstalk is a significant issue in structured cabling, audio electronics, integrated circuit design, wireless communication and other communications systems.

Source: Wikipedia


您正在評估安全控制以實施無線安全。 以下哪一項最無效? (Wentz QOTD)
A. 添加白噪聲
B. 減少近端串擾(NEXT)
C. 啟用 802.1X 對連接請求進行身份驗證
D. 用細金屬網覆蓋工作區

Leave a Reply