Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1. John covertly learns the user ID and password of a higher-ranked technician and uses the credentials to access certain areas of a network. What term describes what John has done?

       A. IP spoofing
       B. Backdooring
       C. Masquerading
       D. Data diddling

       Click Here for the Answer

******************************************************************************

2. What is the purpose of the Data Link layer?
 
      A. End-to-end connection
      B. Dialog control
      C. Framing
      D. Data syntax

       Click Here for the Answer

******************************************************************************

3. Which of the following is not a proprietary encryption algorithm?

       A. RC2
       B. RC4
       C. Blowfish
       D. Skipjack

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.