CISSP PRACTICE QUESTIONS – 20211127

Effective CISSP Questions

You are developing a software solution with a service-oriented architecture. Which of the following is the most critical factor to enforce availability? (Wentz QOTD)
A. Discover and subscribe services from a well-known service registry using UDDI
B. Maintain and completely mediate sessions
C. Invoke services based on standard HTTP verbs
D. Invoke stateless services that follow the single-responsibility principle

Continue reading

CISSP PRACTICE QUESTIONS – 20211125

Effective CISSP Questions

You are developing an anomaly-based IDS that employs artificial intelligence to categorize intrusion examples into various groups. Which of the following is the most intelligent approach to train the model? (Wentz QOTD)
A. Comprehensive knowledge base
B. Pre-selected features by subject matter experts
C. Ubiquitous deployment of sensors and agents
D. Layers of processing for feature transformation and extraction

Continue reading

CISSP PRACTICE QUESTIONS – 20211124

Effective CISSP Questions

A covert channel is an unintended or unauthorized intra-system channel that enables two cooperating entities to transfer information in a way that violates the system’s security policy but does not exceed the entities’ access authorizations. Which of the following is the most critical element to formulate a covert storage channel? (Wentz QOTD)
A. Signaling channel
B. Foothold
C. Slack space
D. Master boot record

Continue reading