Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1. Choose the correct sequence for a pharming attack.

   A. Step 1: Attacker conducts some form of DNS attack causing corrupted DNS resolution.
       Step 2: Victim requests address to bank site from DNS server.
       Step 3: DNS server replies with an incorrect address.
       Step 4: DNS responds with incorrect and malicious address.
       Step 5: Victim goes to malicious bank site.
   B. Step 1: Attacker conducts some form of DNS attack causing corrupted DNS resolution.
       Step 2: DNS server replies with an incorrect address.
       Step 3: Victim requests address to bank site from DNS server.
       Step 4: DNS server replies with an incorrect address.
       Step 5: DNS responds with incorrect and malicious address.
       Step 6: Victim goes to malicious bank site.
   C. Step 1: Victim goes to malicious bank site
       Step 2: Victim requests address to bank site from DNS server.
       Step 3: DNS server replies with an incorrect address.
       Step 4: DNS responds with incorrect and malicious address.
       Step 5: Attacker conducts some form of DNS attack causing corrupted DNS resolution.
   D. Step 1: Attacker conducts some form of DNS attack causing corrupted DNS resolution.
       Step 2: Victim requests address to bank site from DNS server.
       Step 3: DNS server replies with an correct address.
       Step 4: DNS responds with incorrect and malicious address.
       Step 5: Victim goes to malicious bank site.

       Click Here for the Answer

******************************************************************************

2. Jeff is a manager at a financial institution. He needs to make a decision on the best database model to implement within his environment. The data relationship type his applications require is a one to many. Which of the following would be the best model for Jeff to choose?

   A. Relational
   B. Hierarchical
   C. Tree
   D. Structured

       Click Here for the Answer

******************************************************************************

3. Business continuity planning needs to provide several types of functionalities and protection types for an organization. Which of the following is not one of these items?
  i. Provide an immediate and appropriate response to emergency situations
  ii. Protect lives and ensure safety
  iii. Reduce business conflicts
  iv. Resume critical business functions
  v. Work with outside vendors during the recovery period
  vi. Reduce confusion during a crisis
  vii. Ensure survivability of the business
  viii. Get "up and running" quickly after a disaster

     A. ii, iii
     B. iii, iv, vi
     C. i, ii, vii
     D. iii

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.