Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1.  Block ciphers use which of the following to perform mathematical functions, substitution, and permutations on message bits?

       A. S-boxes
       B. Certificates
       C. Keystream
       D. Initialization vectors

       Click Here for the Answer

******************************************************************************

2. If Jan chooses a product based upon this type of technology, how would the objects in the database be uniquely identified and addressed?

   A. Object reuse
   B. Directory System Agents
   C. Distinguished names
   D. Naming trees

       Click Here for the Answer

******************************************************************************

3. Which of the following definitions are incorrect?

       A. Record - A collection of related data items.
       B. File - A collection of columns of the same type.
       C. Primary key - Columns that make each row unique.
       D. View - A virtual relation defined by the database administrator

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.