Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1.  _________________is useful when a processing device requests access to data more quickly than a storage devices can provide access.

       A. RAID
       B. MAID
       C. Data striping
       D. Parity

       Click Here for the Answer

******************************************************************************

2. There are several types of countermeasures that should be implemented in an organization's physical security program. Which of the following is not one of those countermeasures?
   i.   Limit the number of entry points.
   ii.  Force all guests to go to a front desk and sign out before entering the environment.
   iii. Reduce the number of entry points even further after hours or during the weekend, when many employees are around.
   iv.  Have a security guard validate a picture ID before allowing entrance.
   v.   Require guests to sign in and be escorted.
 
      A. None of them
      B. All of them
      C. iii, iv, v
      D. ii, iii

       Click Here for the Answer

******************************************************************************

3. When a process creates a thread, because it needs some instructions and data processed, the CPU uses two registers. A ______________ contains the beginning address that was assigned to the process, and a _____________ contains the ending address.

       A. Limit register, base register
       B. Base register, limit register
       C. Dedicated register, limit register
       D. Limit register, special register

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.