CISSP PRACTICE QUESTIONS – 20220130

Effective CISSP Questions

You are conducting penetration testing against a web server with a physical address, 00-15-5D-24-36-DF, configured as a dual-stack of IPv4 and IPv6. Which of the following is the most likely IP address you use to get started your testing? (Wentz QOTD)
A. 2001:db8::1
B. 169.254.1.1
C. 2001:db8:2:8d:a5:52f5
D. fe80::215:5dff:fe24:36df%10


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220129

Effective CISSP Questions

Which of the following is the best technology to build a small network that connects multiple devices simultaneously for home automation? (Wentz QOTD)
A. Zigbee
B. Li-Fi
C. Bluetooth
D. 802.1X


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220128

Effective CISSP Questions

Your company implements a firewall to protect the internal network, 192.168.1.0/24. Which of the following is incorrect? (Wentz QOTD)
A. 192.168.1.254/24 can be the default gateway.
B. A DHCP client sends the DHCP DISCOVER message with source IP address, 0.0.0.0.
C. The firewall should enable Network Address Translation (NAT) to connect internal hosts to the Internet.
D. The internal network, 192.168.1.0/24 cannot be further subnetted.


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220127

Effective CISSP Questions

Which of the following is a security assurance requirement class defined in Common Criteria (CC)? (Wentz QOTD)
A. Non-repudiation of receipt
B. Access control policy
C. Trusted path
D. Interactions between composed IT entities


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220126

Effective CISSP Questions

You are implementing security controls to mitigate threats. Which of the following best describes the target you are treating? (Wentz QOTD)
A. Uncertainty, likelihood, or possibility
B. Effect, consequence, or impact
C. Residual risk
D. Risk exposure


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220125

Effective CISSP Questions

On August 20, 1998, NIST announced a group of fifteen AES candidate algorithms at the First AES Candidate Conference (AES1) and selected five algorithms from the fifteen as “AES finalists in Round 2 (AES2). Which of the following is least considered in the NIST cryptographic standard selection process? (Wentz QOTD)
A. Kerckhoff’s principle
B. Open design
C. Work factor
D. Locard’s principle of exchange


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading