Home > Blogs > CISSP Questions of the Week

CISSP Questions of the Week

These CISSP Questions of the Week questions and answers were developed by Shon Harris and the Logical Security development team. We hope you find this to be a helpful resource. Simply select the "Click Here" under each question to find the answer.

1.  Which of the following best describes the hierarchical levels of privilege within the architecture of a computer system?

       A. Computer system ring structure
       B. Microcode abstraction levels of security
       C. Operating system user mode
       D. Operating system kernel mode

       Click Here for the Answer

******************************************************************************

2. Which of the following is a risk methodology that is intended to be used in situations where people manage and direct the risk evaluation for information security within their company?
 
      A. Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
      B. ANZ 4360
      C. Failure Modes and Effect Analysis
      D. NIST SP 800-66

       Click Here for the Answer

******************************************************************************

3. Which of the following is not a characteristic of Protected Extensible Authentication Protocol?

       A. Authentication protocol used in wireless networks and Point-to-Point  connections
       B. Designed to provide more secure authentication for 802.11 WLANs
       C. Designed to support 802.1X port access control and Transport Layer Security
       D. Designed to support password protected connections

       Click Here for the Answer

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.