CISSP PRACTICE QUESTIONS – 20211112

Effective CISSP Questions

The original Rijndael documentation, as an Advanced Encryption Standard (AES) candidate, submitted to the NIST dates from June 11, 1998, and the AES standard, FIPS 197, issued by the NIST was approved on November 26, 2001. Which of the following is incorrect? (Wentz QOTD)
A. Rijndael allows the specification of variants with the block length and key length.
B. The number of rounds of Rijndael can be modified in case of security problems.
C. The block length in AES is 128 bits, while the key length can be 128, 192, or 256 bits.
D. AES specifies using the Feistel structure to transpose the intermediate state.

Continue reading

CISSP PRACTICE QUESTIONS – 20211111

Effective CISSP Questions

You are working for a US-based public company and evaluating cloud solutions that hos the ERP system involving financial reporting by referring to the website of one of the most well-known cloud services providers for more information. As a website guest visitor, which of the following is the best SOC report available that informs your evaluation? (Wentz QOTD)
A. SOC 1
B. SOC 2 Type 1
C. SOC 2 Type 2
D. SOC 3

Continue reading

CISSP PRACTICE QUESTIONS – 20211109

Effective CISSP Questions

As a software developer using C-like programming languages, you received a credential in JSON format, {username: “cissp_aspirant@wonderworld.com”, password: “P@$$w0rd”}, from a client and invoked the function, int authenticate (char username[20], char password[10]), to validate the identity. Which of the following is most likely to compromise your code? (Wentz QOTD)
A. SQL Injection
B. Heap overflow
C. Stack overrun
D. Address space layout randomization (ASLR)

Continue reading

CISSP PRACTICE QUESTIONS – 20211105

Effective CISSP Questions

Exchanging information between systems begins with a planning phase in which the participating organizations perform preliminary activities and examine the relevant technical, security, and administrative issues. Which of the following should be conducted first? (Wentz QOTD)
A. Conduct security assessments
B. Conduct risk assessments
C. Define the business case
D. Document the memoranda of understanding/agreement (MOU/A).

Continue reading

CISSP PRACTICE QUESTIONS – 20211104

Effective CISSP Questions

Your organization is a cloud service provider and intends to assure security to customers. which of the following entities conduct security assessments based on public security standards and provide the highest level of assurance? (Wentz QOTD)
A. The audit function within an organization
B. Certification Bodies (CB) accredited by an International Accreditation Forum (IAF) member or Accreditation Body (AB)
C. Certified Public Accountants (CPA) designated by the American Institute of Certified Public Accountants (AICPA)
D. Big or first-class customers

Continue reading