Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1. If an external router filters traffic before it enters the network and another screening device monitors traffic before it enters the internal network, what type of architecture is this?

       A. Screened host
       B. Screened subnet
       C. Dual-homed firewall
       D. Dual subnets

       Click Here for the Answer

******************************************************************************

2. An attack based on the probability of two different messages using the same hash function producing a common message digest is called a:
 
      A. Differential cryptanalysis
      B. Differential linear cryptanalysis
      C. Birthday attack
      D. Statistical attack

       Click Here for the Answer

******************************************************************************

3. There are several examples of single sign-on technologies. Which of the following has the correct mapping of technology type and characteristic?

i.   Kerberos = Authentication protocol that uses a KDC and tickets, and is based on symmetric key cryptography
ii.  SESAME = Authentication protocol that uses a PAS and PACs, and is based on symmetric and asymmetric cryptography
iii. Security domains = Resources working under the same security policy and managed by the same group
iv.  Thin clients = Terminals that rely upon a central server for access control, processing, and storage

       A. i, ii
       B. i, ii, iii
       C. i, ii, iii, iv
       D. ii, iii, iv

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.