Which of the following provides the highest level of security to protect sessions between a client and server? (Wentz QOTD) A. TLS 1.3 B. SSL 3.0 C. TLS 3.1 D. HTTPS
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
Which of the following is least vulnerable to cryptographically relevant quantum computers (CRQC)? (Wentz QOTD) A. Stream ciphers B. The RSA Digital Signature Algorithm C. Key agreement using Diffie-Hellman D. Key exchange using RSA public-key encryption
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
ISO/IEC 27002:2022 Controls by Security Properties and Control TypesISO/IEC 27002:2022 Controls by Cybersecurity Concepts and Security Domains
There are 93 distinct controls introduced in ISO/IEC 27002:2022. They are categorized as: a) people, if they concern individual people; b) physical, if they concern physical objects; c) technological, if they concern technology; d) otherwise they are categorized as organizational.
The international standard, ISO/IEC 27002:2022, has been officially published on Feb 15th, 2022. Each control in the standard has been associated with five attributes with corresponding attribute values. Which of the following is not a value of the control type attribute? (Wentz QOTD) A. Preventive B. Detective C. Corrective D. Recovery
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
According to FIPS 200, adequate security emphasizes that security should be “commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.”Which of the following best justifies implementing security controls and demonstrates the adequate security concept? (Wentz QOTD) A. Information security policy B. Security awareness C. Management commitment D. Business case
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
According to ISO/IEC 38500, a policy stands for the overall “intentions and direction of an organization as formally expressed by its governing body or executive managers acting with appropriate authority.” Which of the following best describes the concept of security management driven by policies? (Wentz QOTD) A. Risk-based management B. Defense in depth C. Strategic alignment D. Top-down approach
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
Which of the following is not an audit conducted by external parties? (Wentz QOTD) A. First-party audit B. Second-party audit C. Third-party audit D. Regulatory audit
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
Which of the following can provide the highest confidence levelin the validity of a message and its origin? (Wentz QOTD) A. MD5 B. SHA256 C. HMAC D. AES
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
Dreams without goals are just dreams. (夢想如果沒有目標就只是夢想) Between goals and achievement are discipline and consistency. (目標和成就之間是紀律和堅韌性) ~ 陳界廷 (Jacky Chen), 志工教練, CISSP、ISO 27001 LAContinue reading →