Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1. What does the Secure Hash Algorithm (SHA-1) create?

       A. A fixed length message digest from a fixed length input message
       B. A variable length message digest from a variable length input message
       C. A fixed length message digest from a variable length input message
       D. A variable length message digest from a fixed length input message

       Click Here for the Answer

******************************************************************************

2. Joe is a member of both the Cashier and Cashier Supervisor roles. If he logs in as a Cashier, the Supervisor role is unavailable to him during that session. If he logs in as Cashier Supervisor, the Cashier role is unavailable to him during that session. What type of RBAC is being employed in this example?
 
      A. Dynamic separation of duty
      B. Static separation of duty
      C. Limited
      D. Hybrid

       Click Here for the Answer

******************************************************************************

3. In some cases, two transactions may, in the course of their processing, attempt to access the same portion of a database at the same time, in a way that prevents them from proceeding. Which of the following best describes this type of situation?

       A. Deadlock
       B. Corruption
       C. Deletion
       D. Misconfiguration

       Click Here for the Answer

Comments

comments powered by Disqus

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.