Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click  Here" under each question to find the answer.

1. Operating systems can carry out software input\output procedures in various ways. Which of the following is not an approach that operating systems use?

i.   Programmed I/O
ii.  Interrupt-driven I/O
iii. I/O using DMA
iv.  Mapped I/O
v.   Fully mapped I/O

       A. iv
       B. i, ii
       C. i, ii, iii
       D. v

       Click Here for the Answer

******************************************************************************

2. The _____________ relies on individual or small group interviews during the first round of information gathering and relies on face-to-face interaction during later rounds of data organizing and reporting.
 
      A. Delphi technique
      B. Qualitative analysis
      C. Quantitative analysis
      D. Modified Delphi technique

       Click Here for the Answer

******************************************************************************

3. DCE is an authentication system that mirrors Kerberos in many ways. Who developed it?

       A. Open Group
       B. Ron Rivest
       C. NSA
       D. Microsoft

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.