CISSP PRACTICE QUESTIONS – 20210613

Effective CISSP Questions

Your company has implemented an on-premises master DNS server in the DMZ protected by a firewall. You are deploying a slave DNS to the cloud for availability concerns. Which of the following is the most feasible firewall policy to allow zone transfer? (Wentz QOTD)
A. Allow UCP port = 53 and RR = AXFR
B. Allow TCP port = 53 and RR = AXFR
C. Allow UDP port = 53 and Source IP = the slave DNS
D. Allow TCP port = 53 and Source IP = the slave DNS

Continue reading

CISSP PRACTICE QUESTIONS – 20210612

Effective CISSP Questions

A firewall with an external interface configured as 10.10.10.10/24 and a sole internal interface, 192.168.0.254/25, receives egress traffic having a source address 192.168.0.7. Which one of the following actions will the firewall most likely take? (Wentz QOTD)
A. Drop the traffic
B. Forward the traffic as is
C. Forward the traffic after replacing 192.168.0.7 with 10.10.10.10
D. Send an ICMP echo request to 192.168.0.7 to validate the traffic

Continue reading

CISSP PRACTICE QUESTIONS – 20210609

Effective CISSP Questions

Engineering is an approach that involves a set of processes to develop a solution, which can be a system, software, or any deliverable, transformed from stakeholders’ requirements and support the solution throughout its life. Which of the following is the most generally accepted correct statement? (Wentz QOTD)
A. ISO/IEC 15288 prescribes six stages in the system life cycle (SLC).
B. The software development life cycle differs from the one of a system.
C. Verification and validation processes are not applied other than the testing stage.
D. A development life cycle addresses the construction of a system instead of acquisition.

Continue reading

CISSP PRACTICE QUESTIONS – 20210608

Effective CISSP Questions

After receiving the bill, Adam insists a hacker logged into an online jewelry store with his credentials and bought a ring using his credit card without his consent. He denied the transaction and refused to pay. Which of the following is the best strategy for the online store to prevent this situation from recurring? (Wentz QOTD)
A. Implement the Digital Signature Algorithm (DSA)
B. Encrypt the hash of the transaction using Adam’s private key
C. Establish a trustworthy enterprise-wide trusted root certification authority
D. Protect Adam’s credentials using hash-based message authentication code (HMAC)

Continue reading

CISSP PRACTICE QUESTIONS – 20210607

Effective CISSP Questions

Your company manufactures sports shoes for a worldwide big label and initiates a business continuity program to support the continuous delivery of products and services. Which of the following should be done first? (Wentz QOTD)
A. Identify critical activities and their maximum tolerable downtime
B. Identify, analyze, and evaluate risk relevant to business continuity
C. Determine the list of products and services to be protected from disruption
D. Define RTO and RPO for critical IT services subject to business requirements

Continue reading

CISSP PRACTICE QUESTIONS – 20210606

Effective CISSP Questions

Your company initiates a project to develop a customer relationship management (CRM) system. As a security professional, you are invited to join the project. Which of the following will you suggest first so that the project manager can incorporate it into the project schedule? (Wentz QOTD)
A. Identify stakeholders and security roles
B. Assess the business impact of the system
C. Identify information types processed by the system
D. Conduct a risk-based review of the system’s design

Continue reading

CISSP PRACTICE QUESTIONS – 20210605

Effective CISSP Questions

After conducting a risk assessment, your organization identified the risk of fire on facilities and data centers. You are considering security controls to respond to the risk. Which of the following should be implemented first? (Wentz QOTD)
A. Conduct fire drills
B. Buy fire insurance
C. Build fire suppression systems
D. Deliver fire safety awareness and training

Continue reading

CISSP PRACTICE QUESTIONS – 20210604

Effective CISSP Questions

To respond to the pandemic of COVID-19, your company decides to implement a centralized virtual desktop infrastructure (VDI) at the headquarters. All branch offices and subsidiaries shall be connected to the data center hosting the VDI. Which of the following is the most cost-effective networking solution with minimum network management workload? (Wentz QOTD)
A. Leased lines
B. Site-to-site SSL VPN
C. L2TP with IPsec in Tunnel mode
D. Multi-protocol label switching (MPLS)

Continue reading