Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1.  Which of the following is an incorrect characteristic of programmable read-only memory (PROM)?
  i.   A typical PROM comes with all bits reading as 0
  ii.  Burning a fuse bit during programming causes the bit to read as 1
  iii. The memory can be programmed just once
  iv.  It is a type of read only memory

       A. i, ii
       B. ii, iii, iv
       C. i, ii, iii
       D. iv

       Click Here for the Answer

******************************************************************************

2. Which of the following are the correct ISO/IEC series mapping that are used as blueprints for organizations to follow when developing their security program:
  i.   ISO/IEC 27001 - Code of practice providing good practice advice on ISMS (previously known as ISO 17799, itself based on British Standard BS 7799 Part 1
  ii.  ISO/IEC 27002 - Based on British Standard BS7799 Part 2, which is establishment, implementation, control, and improvement of the Information Security Management System
  iii. ISO/IEC 27004 - Designed to assist the satisfactory implementation of information security based on a risk management approach
  iv.  ISO/IEC 27005 - A standard for information security management measurements
  v.   ISO/IEC 27006 - A guide to illustrate how to protect personal health information
  vi.  ISO/IEC 27799 - A guide to the certification/registration process
 
      A. i, ii, iii
      B. iv, v
      C. All of them
      D. None of them

       Click Here for the Answer

******************************************************************************

3. Which of the following is not a characteristic of Lightweight Extensible Authentication Protocol?

       A. Proprietary wireless LAN authentication method developed by Cisco Systems
       B. Provides dynamic keys and mutual authentication
       C. Allows for clients to re-authenticate frequently
       D. Replaces WEP

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.