CISSP PRACTICE QUESTIONS – 20211103

Effective CISSP Questions

Kerberos originated from Greek mythology, the ferocious three-headed guard dog of Hades, which comprises clients, the key distribution center (KDC), and servers. The KDC is composed of an authentication service (AS) and a ticket-granting service (TGS). Which of the following is incorrect? (Wentz QOTD)
A. Kerberos can work using DES, AES, or optionally public-key cryptography.
B. Kerberos might be subject to attacks that an attacker impersonates any user.
C. A client sends a username and password encrypted by AES to the AS for authentication.
D. The AS returns an encrypted Ticket-Granting-Ticket (TGT) to the client after authentication.

Continue reading

CISSP PRACTICE QUESTIONS – 20211102

Effective CISSP Questions

As a software developer, you are aware that various generations of programming languages have different features. Which of the following is most vulnerable to buffer overflow attacks? (Wentz QOTD)
A. Client-based applications using C
B. Server-based applications using C#
C. Data-centric applications using Java
D. Backend web applications using JavaScript

Continue reading

CISSP PRACTICE QUESTIONS – 20211101

Effective CISSP Questions

The Software-Defined Network (SDN) architecture typically divides a network into three planes, e.g., application, control, and data planes. Which of the following is not a primary SDN feature? (Wentz QOTD)
A. Virtualize switches on a commercial off-the-shelf (COTS) hardware platform.
B. Program switches on controllers to drop, flood, or forward packets.
C. Builds a virtual overlay network on top of the existing underlay network.
D. Have applications communicate with the controllers through northbound API.

Continue reading