CISSP PRACTICE QUESTIONS – 20220228

Effective CISSP Questions

You are implementing a wireless network that requires user authentication to connect to the access point. Which of the following best supports forwarding authentication requests from the authenticator to the authentication server? (Wentz QOTD)
A. 802.1X
B. VXLAN
C. EAP
D. RADIUS


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220227

Effective CISSP Questions

You are implementing the wireless network for your organization. Which of the following cryptographic functions provides the most adequate security? (Wentz QOTD)
A. Galois/Counter Mode (GCM)
B. Galois Message Authentication Code (GMAC)
C. Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)
D. Advanced Encryption Standard (AES)


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220226

Effective CISSP Questions

Which one of the following is not a security function of a trusted computer system? (Wentz QOTD)
A. To dump memory to the storage and shut down if a problem causes
B. To require a user to press the Ctrl+Alt+Del key combination to activate the log-on screen
C. To limit information exchange through unused slack space in the storage
D. To grant authorization per the data owner’s discretion


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220225

Effective CISSP Questions

Which one of the following has the most negligible impact on the integrity of a relational database? (Wentz QOTD)
A. Transactions
B. Foreign key constraints
C. Primary key constraints
D. Data Query Language (DQL)


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220224

Effective CISSP Questions

The secret key exchange has been the most critical pain point of symmetric ciphers. Diffie-Hellman (DH) is a key agreement protocol to solve the problem. Which one of the following is correct about DH? (Wentz QOTD)
A. Diffie-Hellman by itself can enforce authenticity.
B. Diffie-Hellman can use elliptic curve operations to generate secret keys.
C. Diffie-Hellman is designed to transmit secret keys over an insecure channel.
D. Diffie-Hellman can use modular arithmetic to generate secret keys.


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220223

Effective CISSP Questions

Unified threat management (UTM), also known as integrated threat management (ITM), is an approach to information security that consolidates various security functions into a single hardware or software installation. Which one of the following is incorrect about UTM? (Wentz QOTD)
A. UTM may introduce a single point of failure.
B. UTM adequately aligns with the defense-in-depth strategy.
C. UTM simplifies installation, configuration, and maintenance.
D. UTM appliances are now typically called next-generation firewalls.


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220222

Effective CISSP Questions

You are leading a system engineering project. Which one of the following is a concern that should be addressed at the organization level? (Wentz QOTD)
A. Threat modeling
B. Knowledge management
C. Verification and validation
D. Security architecture definition


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220221

Effective CISSP Questions

Which one of the following risk management tasks should be done first? (Wentz QOTD)
A. Identify risks
B. Conduct risk assessment
C. Establish a shared glossary
D. Determine risk exposure


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220220

Effective CISSP Questions

Given an expression, a ≡ b (mod n), read as a is congruent to b modulo n, which of the following expressions is correct? (Wentz QOTD)
A. 7 ≡ 1 (mod 4)
B. 7 ≡ 2 (mod 5)
C. 7 ≡ 3 (mod 6)
D. 7 ≡ 4 (mod 7)


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading

CISSP PRACTICE QUESTIONS – 20220219

Effective CISSP Questions

According to ISO 22300, business continuity is the capability of an organization to continue the delivery of products and services within acceptable time frames at predefined capacity during a disruption. Which of the following statements about business impact analysis is inappropriate? (Wentz QOTD)
A. Prioritized activities and supporting resources should be identified.
B. The recovery time objective (RTO) and recovery point objective (RPO) for all prioritized activities should be set.
C. Losses due to fines or penalties should be considered.
D. The minimum acceptable capacities of activities should be determined


Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.

Continue reading