Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1.  Which of the following would be considered restrictions of a hierarchical database structure?
    i.   To be able to access a certain data entity within a hierarchical database requires the knowledge of which branch to start with and which route to take through each layer until the data are reached.
    ii.     To be able to access a certain key entity within a hierarchical database requires the knowledge of which branch to start with and which route to take through each layer until the data are reached.
    iii. It does not use indexes as relational databases do for searching procedures.
    iv.  It does use indexes as relational databases do for searching procedures.

        A. i, iii
        B. i, ii, iii
        C. ii, iii, iv
        D. i, ii

       Click Here for the Answer

******************************************************************************

2. When developing a disaster recovery plan, which of the following is the third step?

   A. Conduct the business impact analysis
   B. Develop recovery strategies
   C. Identify preventive controls
   D. Develop the contingency plan

       Click Here for the Answer

******************************************************************************

3. A ________________ is where a computer was used as a tool to help carry out a crime. A ___________ concerns incidents where a computer was the victim of an attack crafted to harm it (and its owners) specifically. The last type of crime is where a computer is not necessarily the attacker or the attackee, but just happened to be involved when a crime was carried out. This category is referred to as _________________.

   A. Computer-assisted crime, computer-targeted crime, computer is incidental
   B. Computer-targeted crime, computer-assisted crime, computer is incidental
   C. Computer-assisted crime, computer is incidental, computer-targeted crime
   D. Computer-associated crime, computer-targeted crime, computer is incidental

       Click Here for the Answer


Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.