Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1. The Kerberos technology has some issues that need to be understood before implementation. Which of the following are issues pertaining to Kerberos?
   i.   The KDC can be a single point of failure. If the KDC goes down, no one can access needed resources. Redundancy is necessary for the KDC.
   ii.  The KDC must be able to handle the number of requests it receives in a timely manner. It must be scalable.
   iii. Secret keys are temporarily stored on the users' workstations, which means it is possible for an intruder to obtain these cryptographic keys.
   iv.  Session keys are decrypted and reside on the users' workstations, either in a cache or in a key table. Again, an intruder can capture these keys.

       A. i, ii, iv
       B. i, iii, iv
       C. i, ii, iii, iv
       D. ii, iii

       Click Here for the Answer

******************************************************************************

2. Which of the following best describes an operation that allows changes to a database to be available to all applications and users?
 
      A. Rollback
      B. Deadlock
      C. Commit
      D. Submit

       Click Here for the Answer

******************************************************************************

3. The BCP Coordinator, working with management, should determine which of the following?

       A. The optimum point to discover the information system while balancing the cost of system inoperability against the cost of resources required for restoring the system and its overall support for critical mission/business functions.
       B. The optimum point to recover the information system while balancing the cost of system inoperability against the cost of resources required for restoring the system and its overall support for critical mission/business functions.
       C. The optimum point to recover the information system while balancing the cost of system inoperability against the value of resources required for restoring the system and its overall support for critical mission/business functions.
       D. The optimum point to discover the information system while balancing the cost of system inoperability against the value of resources required for restoring the system and its overall support for critical mission/business costs.

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.