CISSP PRACTICE QUESTIONS – 20210406

Effective CISSP Questions

Your organization implemented an anomaly-based Intrusion Detection System (IDS) designed to optimize false-negative probability and minimize potential losses. However, the IDS triggered too many false alarms. As the IDS administrator, you are evaluating the configuration change to reduce the number of false alarms. Which of the following is the least likely ramification of the change? (Wentz QOTD)
A. Zero-day exploits might increase
B. Investigation workload might decrease
C. The sensitivity of the IDS might be lowered
D. The detection threshold of IDS might be enlarged

Continue reading

CISSP PRACTICE QUESTIONS – 20210405

Effective CISSP Questions

A tunnel is a logical link or point-to-point connection, established through tunneling protocols, that encapsulates payloads between two nodes over a public or shared network. Still, other security services or protocols protect data transmitted through the tunnel. Which of the following is not a tunneling protocol? (Wentz QOTD)
A. Virtual Extensible LAN (VXLAN)
B. Layer 2 Forwarding Protocol (L2F)
C. Generic Routing Encapsulation (GRE)
D. Encapsulating Security Payload (ESP)

Continue reading

CISSP PRACTICE QUESTIONS – 20210402

Effective CISSP Questions

A France computer manufacturer submits a trusted computer system for the Common Criteria evaluation and receives an EAL 7. The system supports the security policy that allows a user cleared as confidential to prepare reports to the supervisor at the secret level. Which of the following is least likely to be used in the design as a formal model? (Wentz QOTD)
A. Finite state machine
B. Information flow model
C. Non-interference model
D. Mandatory access control

Continue reading

CISSP PRACTICE QUESTIONS – 20210401

Effective CISSP Questions

According to Dorothy E. Denning, “the lattice properties permit concise formulations of the security requirements of different existing systems and facilitate the construction of mechanisms that enforce security.” Which of the following is not a lattice-based access control model? (Wentz QOTD)
A. Biba model
B. Clark-Wilson model
C. Brewer and Nash model
D. Bell-LaPadula (BLP) model

Continue reading

CISSP PRACTICE QUESTIONS – 20210331

Effective CISSP Questions

A trusted computer system is typically designed based on a formal model. Which of the following is incorrect about the Trusted Computer System Evaluation Criteria (TCSEC)? (Wentz QOTD)
A. TCSEC is developed based on the Bell-LaPadula Model (BLP).
B. The clearance/classification scheme is expressed in terms of a lattice.
C. A trusted path ensures recovery without a compromise if secure state transitions fail.
D. Discretionary access control enables objects sharing by named individuals or groups, or both.

Continue reading