Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1.  Which of the following represents the best approach to implementing a security program?

       A. Top down
       B. Bottom up
       C. Compartmented
       D. Distributed

       Click Here for the Answer

******************************************************************************

2. The ______________ is an IETF-defined signaling protocol, widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP).

   A. Session Initiation Protocol
   B. Real-time Transport Protocol
   C. SS7
   D. VoIP

       Click Here for the Answer

******************************************************************************

3. What process takes place after creating a DES session key?

       A. Key signing
       B. Key escrow
       C. Key clustering
       D. Key exchange

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.